CVE-2017-9135

An issue was discovered on Mimosa Client Radios before 2.2.4 and Mimosa Backhaul Radios before 2.2.4. On the backend of the device's web interface, there are some diagnostic tests available that are not displayed on the webpage; these are only accessible by crafting a POST request with a program like cURL. There is one test accessible via cURL that does not properly sanitize user input, allowing an attacker to execute shell commands as the root user.
References
Link Resource
http://blog.iancaling.com/post/160596244178 Third Party Advisory
http://blog.iancaling.com/post/160596244178 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:mimosa:backhaul_radios:*:*:*:*:*:*:*:*
cpe:2.3:o:mimosa:client_radios:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:35

Type Values Removed Values Added
References () http://blog.iancaling.com/post/160596244178 - Third Party Advisory () http://blog.iancaling.com/post/160596244178 - Third Party Advisory

Information

Published : 2017-05-21 21:29

Updated : 2024-11-21 03:35


NVD link : CVE-2017-9135

Mitre link : CVE-2017-9135

CVE.ORG link : CVE-2017-9135


JSON object : View

Products Affected

mimosa

  • client_radios
  • backhaul_radios
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')