An issue was discovered on SoftCase T-Router build 20112017 devices. There are no restrictions on the 'exec command' feature of the T-Router protocol. If the command syntax is correct, there is code execution both on the other modem and on the main servers. This is fixed in production builds as of Spring 2018.
References
Link | Resource |
---|---|
https://gist.github.com/neolead/1b90d8df7ef4fd1d3d03c1265e5804ac#file-cve-2018-11240-txt | Third Party Advisory |
https://gist.github.com/neolead/1b90d8df7ef4fd1d3d03c1265e5804ac#file-cve-2018-11240-txt | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/neolead/1b90d8df7ef4fd1d3d03c1265e5804ac#file-cve-2018-11240-txt - Third Party Advisory |
Information
Published : 2018-09-21 15:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-11240
Mitre link : CVE-2018-11240
CVE.ORG link : CVE-2018-11240
JSON object : View
Products Affected
softcase
- t-router
- t-router_firmware
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource