Inteno EG200 EG200-WU7P1U_ADAMO3.16.4-190226_1650 routers have a JUCI ACL misconfiguration that allows the "user" account to extract the 3DES key via JSON commands to ubus. The 3DES key is used to decrypt the provisioning file provided by Adamo Telecom on a public URL via cleartext HTTP.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/47390 | Exploit Third Party Advisory VDB Entry |
https://twitter.com/GerardFuguet/status/1169298861782896642 | Third Party Advisory |
http://packetstormsecurity.com/files/154494/Inteno-IOPSYS-Gateway-3DES-Key-Extraction-Improper-Access.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/docs/47397 | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-09-16 10:15
Updated : 2022-03-31 10:47
NVD link : CVE-2019-13140
Mitre link : CVE-2019-13140
JSON object : View
CWE
CWE-552
Files or Directories Accessible to External Parties
Products Affected
intenogroup
- eg200_firmware
- eg200