Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ggfg-pcqp-37x5

Опубликовано: 26 янв. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 9.6

Описание

Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.

Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.

EPSS

Процентиль: 52%
0.00285
Низкий

9.6 Critical

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 8.1
nvd
около 3 лет назад

Baicells Nova 227, Nova 233, and Nova 243 LTE TDD eNodeB and Nova 246 devices with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce. 

CVSS3: 9.6
fstec
около 3 лет назад

Уязвимость микропрограммного обеспечения систем управления сетями LTE Baicells RTS & RTD, позволяющая нарушителю выполнить произвольный код с root-привилегиями

EPSS

Процентиль: 52%
0.00285
Низкий

9.6 Critical

CVSS3

Дефекты

CWE-79