An authenticated attacker can send a specially crafted route to the “edit_route.cgi” binary and have it execute shell commands. This vulnerability impacts products based on HID Mercury Intelligent Controllers LP1501, LP1502, LP2500, LP4502, and EP4502 which contain firmware versions prior to 1.303 for the LP series and 1.297 for the EP series. An attacker with this level of access on the device can monitor all communications sent to and from this device, modify onboard relays, change configuration files, or cause the device to become unstable.
References
Link | Resource |
---|---|
https://www.corporate.carrier.com/product-security/advisories-resources/ | Vendor Advisory |
https://www.corporate.carrier.com/product-security/advisories-resources/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
History
21 Nov 2024, 07:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.corporate.carrier.com/product-security/advisories-resources/ - Vendor Advisory |
17 Jun 2022, 14:56
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.corporate.carrier.com/product-security/advisories-resources/ - Vendor Advisory | |
CPE | cpe:2.3:o:carrier:lenels2_lnl-x4420_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:lp1502_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:carrier:lenels2_s2-lp-1502:-:*:*:*:*:*:*:* cpe:2.3:o:carrier:lenels2_lnl-4420_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:carrier:lenels2_s2-lp-2500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:lp2500:-:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:lp1501:-:*:*:*:*:*:*:* cpe:2.3:o:carrier:lenels2_lnl-x2220_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:carrier:lenels2_s2-lp-4502:-:*:*:*:*:*:*:* cpe:2.3:h:carrier:lenels2_lnl-x4420:-:*:*:*:*:*:*:* cpe:2.3:o:carrier:lenels2_lnl-x2210_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:ep4502_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:carrier:lenels2_s2-lp-1501:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:lp2500_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:lp4502_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:carrier:lenels2_s2-lp-2500:-:*:*:*:*:*:*:* cpe:2.3:o:hidglobal:lp1501_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:carrier:lenels2_lnl-x2210:-:*:*:*:*:*:*:* cpe:2.3:h:carrier:lenels2_lnl-4420:-:*:*:*:*:*:*:* cpe:2.3:o:carrier:lenels2_lnl-x3300_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:ep4502:-:*:*:*:*:*:*:* cpe:2.3:h:carrier:lenels2_lnl-x3300:-:*:*:*:*:*:*:* cpe:2.3:o:carrier:lenels2_s2-lp-1501_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:lp1502:-:*:*:*:*:*:*:* cpe:2.3:h:carrier:lenels2_lnl-x2220:-:*:*:*:*:*:*:* cpe:2.3:o:carrier:lenels2_s2-lp-1502_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:carrier:lenels2_s2-lp-4502_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:hidglobal:lp4502:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 8.8 |
CWE | CWE-78 |
06 Jun 2022, 17:39
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-06 17:15
Updated : 2024-11-21 07:04
NVD link : CVE-2022-31486
Mitre link : CVE-2022-31486
CVE.ORG link : CVE-2022-31486
JSON object : View
Products Affected
carrier
- lenels2_lnl-x3300
- lenels2_s2-lp-1502_firmware
- lenels2_lnl-4420
- lenels2_s2-lp-1501
- lenels2_s2-lp-1502
- lenels2_lnl-x2210
- lenels2_lnl-x3300_firmware
- lenels2_lnl-x2220_firmware
- lenels2_lnl-4420_firmware
- lenels2_s2-lp-2500_firmware
- lenels2_lnl-x2210_firmware
- lenels2_lnl-x4420
- lenels2_s2-lp-1501_firmware
- lenels2_s2-lp-4502_firmware
- lenels2_lnl-x2220
- lenels2_s2-lp-2500
- lenels2_lnl-x4420_firmware
- lenels2_s2-lp-4502
hidglobal
- lp2500_firmware
- lp1502_firmware
- ep4502
- lp1501_firmware
- lp1502
- lp4502
- lp4502_firmware
- ep4502_firmware
- lp2500
- lp1501
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')