Privilege Escalation on iBall iB-WRA300N3GT iB-WRA300N3GT_1.1.1 devices allows remote authenticated users to obtain root privileges by leveraging a guest/user/normal account to submit a modified privilege parameter to /form2userconfig.cgi.
References
Link | Resource |
---|---|
http://www.uniquish.tech/2017/11/privelege-escalation-in-iball-ib.html | Exploit Third Party Advisory URL Repurposed |
http://www.uniquish.tech/2017/11/privelege-escalation-in-iball-ib.html | Exploit Third Party Advisory URL Repurposed |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.uniquish.tech/2017/11/privelege-escalation-in-iball-ib.html - Exploit, Third Party Advisory, URL Repurposed |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://www.uniquish.tech/2017/11/privelege-escalation-in-iball-ib.html - Exploit, Third Party Advisory, URL Repurposed |
Information
Published : 2017-11-13 09:29
Updated : 2024-11-21 03:07
NVD link : CVE-2017-11169
Mitre link : CVE-2017-11169
CVE.ORG link : CVE-2017-11169
JSON object : View
Products Affected
iball
- ib-wra300n3gt
- ib-wra300n3gt_firmware
CWE