PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices allow authenticated users to inject system commands through a modified POST request to a specific URL.
References
Link | Resource |
---|---|
https://cert.vde.com/en-us/advisories/ | Third Party Advisory |
https://cert.vde.com/en-us/advisories/vde-2020-003 | Third Party Advisory |
http://seclists.org/fulldisclosure/2020/Mar/15 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/156729/Phoenix-Contact-TC-Router-TC-Cloud-Client-Command-Injection.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Information
Published : 2020-03-12 07:15
Updated : 2020-03-16 08:52
NVD link : CVE-2020-9436
Mitre link : CVE-2020-9436
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
phoenixcontact
- tc_cloud_client_1002-4g_firmware
- tc_router_3002t-4g
- tc_router_3002t-4g_vzw
- tc_router_3002t-4g_vzw_firmware
- tc_cloud_client_1002-txtx_firmware
- tc_router_2002t-3g
- tc_cloud_client_1002-4g
- tc_cloud_client_1002-txtx
- tc_router_2002t-3g_firmware
- tc_router_3002t-4g_att_firmware
- tc_router_3002t-4g_firmware
- tc_router_3002t-4g_att