Логотип exploitDog
bind:CVE-2017-11361
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-11361

Количество 2

Количество 2

nvd логотип

CVE-2017-11361

больше 8 лет назад

Inteno routers have a JUCI ACL misconfiguration that allows the "user" account to read files, write to files, and add root SSH keys via JSON commands to ubus. (Exploitation is sometimes easy because the "user" password might be "user" or might match the Wi-Fi key.)

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-ccq5-xh7c-28ph

больше 3 лет назад

Inteno routers have a JUCI ACL misconfiguration that allows the "user" account to read files, write to files, and add root SSH keys via JSON commands to ubus. (Exploitation is sometimes easy because the "user" password might be "user" or might match the Wi-Fi key.)

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-11361

Inteno routers have a JUCI ACL misconfiguration that allows the "user" account to read files, write to files, and add root SSH keys via JSON commands to ubus. (Exploitation is sometimes easy because the "user" password might be "user" or might match the Wi-Fi key.)

CVSS3: 8.8
1%
Низкий
больше 8 лет назад
github логотип
GHSA-ccq5-xh7c-28ph

Inteno routers have a JUCI ACL misconfiguration that allows the "user" account to read files, write to files, and add root SSH keys via JSON commands to ubus. (Exploitation is sometimes easy because the "user" password might be "user" or might match the Wi-Fi key.)

CVSS3: 8.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу