CVE-2017-11361

Inteno routers have a JUCI ACL misconfiguration that allows the "user" account to read files, write to files, and add root SSH keys via JSON commands to ubus. (Exploitation is sometimes easy because the "user" password might be "user" or might match the Wi-Fi key.)
References
Link Resource
https://neonsea.uk/blog/2017/07/17/cve-2017-11361.html Exploit Third Party Advisory
https://neonsea.uk/blog/2017/07/17/cve-2017-11361.html Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:intenogroup:inteno_router_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:intenogroup:inteno_router:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:07

Type Values Removed Values Added
References () https://neonsea.uk/blog/2017/07/17/cve-2017-11361.html - Exploit, Third Party Advisory () https://neonsea.uk/blog/2017/07/17/cve-2017-11361.html - Exploit, Third Party Advisory

Information

Published : 2017-07-17 17:29

Updated : 2024-11-21 03:07


NVD link : CVE-2017-11361

Mitre link : CVE-2017-11361

CVE.ORG link : CVE-2017-11361


JSON object : View

Products Affected

intenogroup

  • inteno_router
  • inteno_router_firmware
CWE
CWE-269

Improper Privilege Management