MultiTech Conduit MTCDT-LVW2-24XX 1.4.17-ocea-13592 devices allow remote authenticated administrators to execute arbitrary OS commands by navigating to the Debug Options page and entering shell metacharacters in the interface JSON field of the ping function.
References
Link | Resource |
---|---|
https://sku11army.blogspot.com/2020/01/multitech-authenticated-remote-code.html | Exploit Third Party Advisory |
https://sku11army.blogspot.com/2020/01/multitech-authenticated-remote-code.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://sku11army.blogspot.com/2020/01/multitech-authenticated-remote-code.html - Exploit, Third Party Advisory |
Information
Published : 2020-01-21 22:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7594
Mitre link : CVE-2020-7594
CVE.ORG link : CVE-2020-7594
JSON object : View
Products Affected
multitech
- conduit_mtcdt-lvw2-246a
- conduit_mtcdt-lvw2-246a_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')