HooToo TripMate Titan HT-TM05 and HT-05 routers with firmware 2.000.022 and 2.000.082 allow remote command execution via shell metacharacters in the mac parameter of a protocol.csp?function=set&fname=security&opt=mac_table request.
References
Link | Resource |
---|---|
https://ioactive.com/hootoo-tripmate-routers-are-cute-but/ | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/46143 | Exploit Third Party Advisory VDB Entry |
https://ioactive.com/hootoo-tripmate-routers-are-cute-but/ | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/46143 | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://ioactive.com/hootoo-tripmate-routers-are-cute-but/ - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/46143 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-06-11 21:29
Updated : 2024-11-21 04:02
NVD link : CVE-2018-20841
Mitre link : CVE-2018-20841
CVE.ORG link : CVE-2018-20841
JSON object : View
Products Affected
hootoo
- tripmate_titan_ht-tm05_firmware
- tripmate_titan_ht-tm05
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')