An issue was discovered in the firewall3 component in Inteno IOPSYS 1.0 through 3.16. The attacker must make a JSON-RPC method call to add a firewall rule as an "include" and point the "path" argument to a malicious script or binary. This gets executed as root when the firewall changes are committed.
References
Link | Resource |
---|---|
https://neonsea.uk/blog/2018/12/26/firewall-includes.html | Exploit Third Party Advisory |
http://public.inteno.se/?p=feed-inteno-openwrt.git;a=commit;h=e6159ca928d7f0c143be213afc6bf810c0329fe2 | Vendor Advisory |
Configurations
Information
Published : 2019-04-11 14:29
Updated : 2019-04-12 07:14
NVD link : CVE-2018-20487
Mitre link : CVE-2018-20487
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
inteno
- iopsys