An issue was discovered in the firewall3 component in Inteno IOPSYS 1.0 through 3.16. The attacker must make a JSON-RPC method call to add a firewall rule as an "include" and point the "path" argument to a malicious script or binary. This gets executed as root when the firewall changes are committed.
References
Link | Resource |
---|---|
http://public.inteno.se/?p=feed-inteno-openwrt.git%3Ba=commit%3Bh=e6159ca928d7f0c143be213afc6bf810c0329fe2 | |
https://neonsea.uk/blog/2018/12/26/firewall-includes.html | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-04-11 21:29
Updated : 2024-02-04 20:20
NVD link : CVE-2018-20487
Mitre link : CVE-2018-20487
CVE.ORG link : CVE-2018-20487
JSON object : View
Products Affected
inteno
- iopsys
CWE
CWE-20
Improper Input Validation