-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathCVE-2024-53939.txt
63 lines (63 loc) · 1.95 KB
/
CVE-2024-53939.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
An issue was discovered in Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The /cgi-bin/luci/admin/opsw/Dual_freq_un_apple endpoint is vulnerable to
> command injection through the 2.4 GHz and 5 GHz name parameters, allowing an attacker to execute arbitrary commands on the device (with root-level permissions) via crafted input.
>
> ------------------------------------------
>
> [Vulnerability Type Other]
> CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
>
> ------------------------------------------
>
> [Vendor of Product]
> Victure
>
> ------------------------------------------
>
> [Affected Product Code Base]
> Product Name: Victure RX1800 WiFi 6 Router - Software Version: EN_V1.0.0_r12_110933
>
> ------------------------------------------
>
> [Affected Component]
> /cgi-bin/luci/admin/opsw/Dual_freq_un_apple endpoint, vulnerable to command injection
>
> ------------------------------------------
>
> [Attack Type]
> Remote
>
> ------------------------------------------
>
> [Impact Code execution]
> true
>
> ------------------------------------------
>
> [Impact Denial of Service]
> true
>
> ------------------------------------------
>
> [Impact Escalation of Privileges]
> true
>
> ------------------------------------------
>
> [Impact Information Disclosure]
> true
>
> ------------------------------------------
>
> [Attack Vectors]
> Command Injection on Dual Frequency Endpoint: The /cgi-bin/luci/admin/opsw/Dual_freq_un_apple endpoint allows command injection via the parameters used to name the 2.4 GHz and 5 GHz Wi-Fi networks. By sending malicious payloads through these parameters, an attacker can execute arbitrary commands on the device.
>
> ------------------------------------------
>
> [Reference]
> https://www.newegg.com/p/2W6-002R-00004
> https://github.com/actuator/cve/tree/main/Victure
>
> ------------------------------------------
>
> [Discoverer]
> Edward Warren