Описание
An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.
An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2018-4063
- https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03
- https://talosintelligence.com/vulnerability_reports/TALOS-2018-0748
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-4063
- https://www.forescout.com/blog/ot-network-security-threats-industrial-routers-under-attack
- http://packetstormsecurity.com/files/152648/Sierra-Wireless-AirLink-ES450-ACEManager-upload.cgi-Remote-Code-Execution.html
- http://www.securityfocus.com/bid/108147
Связанные уязвимости
An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.