Juplink RX4-1500 v1.0.3 allows remote attackers to gain root access to the Linux subsystem via an unsanitized exec call (aka Command Line Injection), if the undocumented telnetd service is enabled and the attacker can authenticate as admin from the local network.
References
Link | Resource |
---|---|
https://cerne.xyz/bugs/CVE-2020-8797.html | Exploit Third Party Advisory |
https://cerne.xyz/bugs/CVE-2020-8797.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://cerne.xyz/bugs/CVE-2020-8797.html - Exploit, Third Party Advisory |
Information
Published : 2020-04-23 18:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-8797
Mitre link : CVE-2020-8797
CVE.ORG link : CVE-2020-8797
JSON object : View
Products Affected
juplink
- rx4-1500
- rx4-1500_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')