An issue was discovered on Gemtek WRTM-127ACN 01.01.02.141 and WRTM-127x9 01.01.02.127 devices. The Monitor Diagnostic network page allows an authenticated attacker to execute a command directly on the target machine. Commands are executed as the root user (uid 0). (Even if a login is required, most routers are left with default credentials.)
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/160136/Gemtek-WVRTM-127ACN-01.01.02.141-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
https://pastebin.com/QTev1TjM | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-09-24T14:17:54
Updated: 2020-11-19T17:06:11
Reserved: 2020-08-17T00:00:00
Link: CVE-2020-24365
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-09-24T15:15:14.437
Modified: 2022-04-28T18:21:15.493
Link: CVE-2020-24365
JSON object: View
Redhat Information
No data.