On Appear TV XC5000 and XC5100 devices with firmware 3.26.217, it is possible to read OS files with a specially crafted HTTP request (such as GET /../../../../../../../../../../../../etc/passwd) to the web server (fuzzd/0.1.1) running the Maintenance Center on port TCP/8088. This can lead to full compromise of the device.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2018/Apr/34 | Exploit Mailing List Mitigation Third Party Advisory |
http://seclists.org/fulldisclosure/2018/Apr/34 | Exploit Mailing List Mitigation Third Party Advisory |
Configurations
History
21 Nov 2024, 04:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2018/Apr/34 - Exploit, Mailing List, Mitigation, Third Party Advisory |
Information
Published : 2018-04-17 20:29
Updated : 2024-11-21 04:12
NVD link : CVE-2018-7539
Mitre link : CVE-2018-7539
CVE.ORG link : CVE-2018-7539
JSON object : View
Products Affected
appeartv
- xc5100_firmware
- xc5000_firmware
- xc5100
- xc5000
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')