Improper input sanitization within the restricted administration shell on UCOPIA Wireless Appliance devices using firmware version 5.1.x before 5.1.13 allows authenticated remote attackers to escape the shell and escalate their privileges by adding a LocalCommand to the SSH configuration file in the user home folder.
References
Link | Resource |
---|---|
https://securite.intrinsec.com/2018/08/20/cve-2018-15481-ucopia-wireless-appliance-restricted-shell-escape-5-1-13/ | Third Party Advisory |
https://securite.intrinsec.com/2018/08/20/cve-2018-15481-ucopia-wireless-appliance-restricted-shell-escape-5-1-13/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://securite.intrinsec.com/2018/08/20/cve-2018-15481-ucopia-wireless-appliance-restricted-shell-escape-5-1-13/ - Third Party Advisory |
Information
Published : 2018-08-21 16:29
Updated : 2024-11-21 03:50
NVD link : CVE-2018-15481
Mitre link : CVE-2018-15481
CVE.ORG link : CVE-2018-15481
JSON object : View
Products Affected
ucopia
- wireless_appliance
- wireless_appliance_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')