CVE-2020-8949

Gocloud S2A_WL 4.2.7.16471, S2A 4.2.7.17278, S2A 4.3.0.15815, S2A 4.3.0.17193, S3A K2P MTK 4.2.7.16528, S3A 4.3.0.16572, and ISP3000 4.3.0.17190 devices allows remote attackers to execute arbitrary OS commands via shell metacharacters in a ping operation, as demonstrated by the cgi-bin/webui/admin/tools/app_ping/diag_ping/; substring.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:gocloud:s2a_wl_firmware:4.2.7.16471:*:*:*:*:*:*:*
cpe:2.3:h:gocloud:s2a_wl:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:gocloud:s2a_firmware:4.2.7.17278:*:*:*:*:*:*:*
cpe:2.3:o:gocloud:s2a_firmware:4.3.0.15815:*:*:*:*:*:*:*
cpe:2.3:o:gocloud:s2a_firmware:4.3.0.17193:*:*:*:*:*:*:*
cpe:2.3:h:gocloud:s2a:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:gocloud:s3a_k2p_mtk_firmware:4.2.7.16528:*:*:*:*:*:*:*
cpe:2.3:h:gocloud:s3a_k2p_mtk:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:gocloud:s3a_firmware:4.3.0.16572:*:*:*:*:*:*:*
cpe:2.3:h:gocloud:s3a:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:gocloud:isp3000_firmware:4.3.0.17190:*:*:*:*:*:*:*
cpe:2.3:h:gocloud:isp3000:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:39

Type Values Removed Values Added
References () https://sku11army.blogspot.com/2020/02/gocloud-rce-in-gocloud-routers.html - Exploit, Third Party Advisory () https://sku11army.blogspot.com/2020/02/gocloud-rce-in-gocloud-routers.html - Exploit, Third Party Advisory

Information

Published : 2020-02-12 19:15

Updated : 2024-11-21 05:39


NVD link : CVE-2020-8949

Mitre link : CVE-2020-8949

CVE.ORG link : CVE-2020-8949


JSON object : View

Products Affected

gocloud

  • s2a_firmware
  • s2a
  • isp3000_firmware
  • s3a
  • s2a_wl
  • s3a_firmware
  • s2a_wl_firmware
  • s3a_k2p_mtk
  • isp3000
  • s3a_k2p_mtk_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')