An issue was discovered on Mimosa Client Radios before 2.2.4 and Mimosa Backhaul Radios before 2.2.4. On the backend of the device's web interface, there are some diagnostic tests available that are not displayed on the webpage; these are only accessible by crafting a POST request with a program like cURL. There is one test accessible via cURL that does not properly sanitize user input, allowing an attacker to execute shell commands as the root user.
References
Link | Resource |
---|---|
http://blog.iancaling.com/post/160596244178 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-05-21 14:29
Updated : 2017-05-26 06:19
NVD link : CVE-2017-9135
Mitre link : CVE-2017-9135
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
mimosa
- backhaul_radios
- client_radios