Comtech Stampede FX-1010 7.4.3 devices allow remote authenticated administrators to achieve remote code execution by navigating to the Diagnostics Trace Route page and entering shell metacharacters in the Target IP address field. (In some cases, authentication can be achieved with the comtech password for the comtech account.)
References
Link | Resource |
---|---|
https://sku11army.blogspot.com/2020/01/comtech-authenticated-rce-on-comtech.html | Exploit Third Party Advisory |
https://sku11army.blogspot.com/2020/01/comtech-authenticated-rce-on-comtech.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://sku11army.blogspot.com/2020/01/comtech-authenticated-rce-on-comtech.html - Exploit, Third Party Advisory |
Information
Published : 2020-01-20 22:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-7242
Mitre link : CVE-2020-7242
CVE.ORG link : CVE-2020-7242
JSON object : View
Products Affected
comtechtel
- stampede_fx-1010_firmware
- stampede_fx-1010
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')