Using a specially crafted URL command, a remote authenticated user can execute commands as root on the G-Cam and G-Code (Firmware Versions 1.12.0.25 and prior as well as the limited Versions 1.12.13.2 and 1.12.14.5).
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-219-03 | Third Party Advisory US Government Resource |
http://packetstormsecurity.com/files/158888/Geutebruck-testaction.cgi-Remote-Command-Execution.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-08-14 07:15
Updated : 2020-08-19 14:32
NVD link : CVE-2020-16205
Mitre link : CVE-2020-16205
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
geutebrueck
- g-cam_efd-2250_firmware
- g-cam_ethc-2249
- g-cam_ewpc-2270_firmware
- g-cam_efd-2241_firmware
- g-cam_ethc-2230_firmware
- g-cam_ebc-2110
- g-code_eec-2400
- g-cam_ethc-2230
- g-cam_efd-2250
- g-cam_ethc-2239
- g-cam_ethc-2240_firmware
- g-cam_ebc-2111
- g-cam_ethc-2240
- g-cam_ebc-2110_firmware
- g-cam_efd-2240_firmware
- g-cam_efd-2241
- g-cam_ethc-2239_firmware
- g-cam_ebc-2111_firmware
- g-cam_efd-2240
- g-cam_ewpc-2270
- g-code_eec-2400_firmware
- g-cam_ethc-2249_firmware