Local file inclusion in Pyrescom Termod4 time management devices before 10.04k allows authenticated remote attackers to traverse directories and read sensitive files via the Maintenance > Logs menu and manipulating the file-path in the URL.
References
Link | Resource |
---|---|
https://github.com/Outpost24/Pyrescom-Termod-PoC | Exploit Third Party Advisory |
https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device | Exploit Third Party Advisory |
https://pyres.com/en/solutions/termod-4/ | Product Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-01-22T13:11:37
Updated: 2021-02-05T15:22:44
Reserved: 2020-08-13T00:00:00
Link: CVE-2020-23161
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-01-26T18:15:42.397
Modified: 2021-03-30T13:15:53.533
Link: CVE-2020-23161
JSON object: View
Redhat Information
No data.
CWE