RunExeFile.exe in the installer for DEWESoft X3 SP1 (64-bit) devices does not require authentication for sessions on TCP port 1999, which allows remote attackers to execute arbitrary code or access internal commands, as demonstrated by a RUN command that launches a .EXE file located at an arbitrary external URL, or a "SETFIREWALL Off" command.
References
Link | Resource |
---|---|
http://hyp3rlinx.altervista.org/advisories/DEWESOFT-X3-REMOTE-INTERNAL-COMMAND-ACCESS.txt | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/44275/ | Exploit Third Party Advisory VDB Entry |
http://hyp3rlinx.altervista.org/advisories/DEWESOFT-X3-REMOTE-INTERNAL-COMMAND-ACCESS.txt | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/44275/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://hyp3rlinx.altervista.org/advisories/DEWESOFT-X3-REMOTE-INTERNAL-COMMAND-ACCESS.txt - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/44275/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-03-15 01:29
Updated : 2024-11-21 04:12
NVD link : CVE-2018-7756
Mitre link : CVE-2018-7756
CVE.ORG link : CVE-2018-7756
JSON object : View
Products Affected
dewesoft
- dewesoft
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')