CVE-2018-11240

An issue was discovered on SoftCase T-Router build 20112017 devices. There are no restrictions on the 'exec command' feature of the T-Router protocol. If the command syntax is correct, there is code execution both on the other modem and on the main servers. This is fixed in production builds as of Spring 2018.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:softcase:t-router_firmware:20112017:*:*:*:*:*:*:*
cpe:2.3:h:softcase:t-router:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () https://gist.github.com/neolead/1b90d8df7ef4fd1d3d03c1265e5804ac#file-cve-2018-11240-txt - Third Party Advisory () https://gist.github.com/neolead/1b90d8df7ef4fd1d3d03c1265e5804ac#file-cve-2018-11240-txt - Third Party Advisory

Information

Published : 2018-09-21 15:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-11240

Mitre link : CVE-2018-11240

CVE.ORG link : CVE-2018-11240


JSON object : View

Products Affected

softcase

  • t-router
  • t-router_firmware
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource