CVE-2018-20487

An issue was discovered in the firewall3 component in Inteno IOPSYS 1.0 through 3.16. The attacker must make a JSON-RPC method call to add a firewall rule as an "include" and point the "path" argument to a malicious script or binary. This gets executed as root when the firewall changes are committed.
Configurations

Configuration 1 (hide)

cpe:2.3:a:inteno:iopsys:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:56

Type Values Removed Values Added
References
  • {'url': 'http://public.inteno.se/?p=feed-inteno-openwrt.git;a=commit;h=e6159ca928d7f0c143be213afc6bf810c0329fe2', 'name': 'http://public.inteno.se/?p=feed-inteno-openwrt.git;a=commit;h=e6159ca928d7f0c143be213afc6bf810c0329fe2', 'tags': ['Vendor Advisory'], 'refsource': 'CONFIRM'}
  • () http://public.inteno.se/?p=feed-inteno-openwrt.git%3Ba=commit%3Bh=e6159ca928d7f0c143be213afc6bf810c0329fe2 -

Information

Published : 2019-04-11 21:29

Updated : 2024-02-28 17:08


NVD link : CVE-2018-20487

Mitre link : CVE-2018-20487

CVE.ORG link : CVE-2018-20487


JSON object : View

Products Affected

inteno

  • iopsys
CWE
CWE-20

Improper Input Validation