Описание
GreenPacket OH736's WR-1200 Indoor Unit, OT-235 with firmware versions M-IDU-1.6.0.3_V1.1 and MH-46360-2.0.3-R5-GP respectively are vulnerable to remote command injection. Commands are executed using pre-login execution and executed with root privileges allowing complete takeover.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:greenpacket:wr-1200_firmware:m-idu-1.6.0.3_v1.1:*:*:*:*:*:*:*
cpe:2.3:h:greenpacket:wr-1200:-:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
Одно из
cpe:2.3:o:greenpacket:ot-235_firmware:m-idu-1.6.0.3_v1.1:*:*:*:*:*:*:*
cpe:2.3:o:greenpacket:ot-235_firmware:mh-46360-2.0.3-r5-gp:*:*:*:*:*:*:*
cpe:2.3:h:greenpacket:ot-235:-:*:*:*:*:*:*:*
EPSS
Процентиль: 90%
0.05646
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-77
CWE-77
Связанные уязвимости
CVSS3: 9.8
github
почти 3 года назад
GreenPacket OH736's WR-1200 Indoor Unit, OT-235 with firmware versions M-IDU-1.6.0.3_V1.1 and MH-46360-2.0.3-R5-GP respectively are vulnerable to remote command injection. Commands are executed using pre-login execution and executed with root privileges allowing complete takeover.
EPSS
Процентиль: 90%
0.05646
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-77
CWE-77