Authenticated Shell Command Injection in Raisecom GPON Devices
CVE-2019-7384

7.8HIGH

Key Information:

Vendor
Raisecom
Vendor
CVE Published:
21 March 2019

Summary

An authenticated shell command injection vulnerability exists in the Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products when utilizing firmware versions ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or lower. Due to insufficient validation of the 'fmgpon_loid' parameter, attackers with authenticated access can execute arbitrary code within the system environment. This flaw poses a significant risk, enabling unauthorized actions that can compromise network integrity.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.