Inteno EG200 EG200-WU7P1U_ADAMO3.16.4-190226_1650 routers have a JUCI ACL misconfiguration that allows the "user" account to extract the 3DES key via JSON commands to ubus. The 3DES key is used to decrypt the provisioning file provided by Adamo Telecom on a public URL via cleartext HTTP.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154494/Inteno-IOPSYS-Gateway-3DES-Key-Extraction-Improper-Access.html | Exploit Third Party Advisory VDB Entry |
https://twitter.com/GerardFuguet/status/1169298861782896642 | Third Party Advisory |
https://www.exploit-db.com/docs/47397 | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/47390 | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2019-09-16 17:15
Updated : 2024-02-28 17:08
NVD link : CVE-2019-13140
Mitre link : CVE-2019-13140
CVE.ORG link : CVE-2019-13140
JSON object : View
Products Affected
intenogroup
- eg200
- eg200_firmware
CWE
CWE-552
Files or Directories Accessible to External Parties