Comtech Stampede FX-1010 7.4.3 devices allow remote authenticated administrators to execute arbitrary OS commands by navigating to the Diagnostics Ping page and entering shell metacharacters in the Target IP address field. (In some cases, authentication can be achieved with the comtech password for the comtech account.)
References
Link | Resource |
---|---|
https://overload.cl/blog/comtech-authenticated-rce-on-comtech-fx-series/ | Exploit Third Party Advisory |
https://sku11army.blogspot.com/2020/01/comtech-authenticated-rce-on-comtech-fx.html | Exploit Third Party Advisory |
https://overload.cl/blog/comtech-authenticated-rce-on-comtech-fx-series/ | Exploit Third Party Advisory |
https://sku11army.blogspot.com/2020/01/comtech-authenticated-rce-on-comtech-fx.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://overload.cl/blog/comtech-authenticated-rce-on-comtech-fx-series/ - Exploit, Third Party Advisory | |
References | () https://sku11army.blogspot.com/2020/01/comtech-authenticated-rce-on-comtech-fx.html - Exploit, Third Party Advisory |
Information
Published : 2020-01-02 14:16
Updated : 2024-11-21 05:33
NVD link : CVE-2020-5179
Mitre link : CVE-2020-5179
CVE.ORG link : CVE-2020-5179
JSON object : View
Products Affected
comtechtel
- stampede_fx-1010_firmware
- stampede_fx-1010
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')