CVE-2018-20218

An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. The login form passes user input directly to a shell command without any kind of escaping or validation in /usr/share/www/check.lp file. An attacker is able to perform command injection using the "password" parameter in the login form.
References
Link Resource
https://zxsecurity.co.nz/research.html Not Applicable
http://seclists.org/fulldisclosure/2019/Feb/48 Exploit Mailing List Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:teracue:enc-400_hdmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:teracue:enc-400_hdmi:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:teracue:enc-400_hdmi2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:teracue:enc-400_hdmi2:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:teracue:enc-400_hdsdi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:teracue:enc-400_hdsdi:-:*:*:*:*:*:*:*

Information

Published : 2019-03-21 09:00

Updated : 2019-10-02 17:03


NVD link : CVE-2018-20218

Mitre link : CVE-2018-20218


JSON object : View

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Advertisement

dedicated server usa

Products Affected

teracue

  • enc-400_hdmi_firmware
  • enc-400_hdmi
  • enc-400_hdmi2_firmware
  • enc-400_hdmi2
  • enc-400_hdsdi
  • enc-400_hdsdi_firmware