Inteno routers have a JUCI ACL misconfiguration that allows the "user" account to read files, write to files, and add root SSH keys via JSON commands to ubus. (Exploitation is sometimes easy because the "user" password might be "user" or might match the Wi-Fi key.)
                
            References
                    | Link | Resource | 
|---|---|
| https://neonsea.uk/blog/2017/07/17/cve-2017-11361.html | Exploit Third Party Advisory | 
| https://neonsea.uk/blog/2017/07/17/cve-2017-11361.html | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 03:07
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://neonsea.uk/blog/2017/07/17/cve-2017-11361.html - Exploit, Third Party Advisory | 
Information
                Published : 2017-07-17 17:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-11361
Mitre link : CVE-2017-11361
CVE.ORG link : CVE-2017-11361
JSON object : View
Products Affected
                intenogroup
- inteno_router_firmware
- inteno_router
CWE
                
                    
                        
                        CWE-269
                        
            Improper Privilege Management
