OS Command Injection Vulnerability in MitraStar GPT-2541GNAC Firewall Settings
CVE-2024-9977

4.7MEDIUM

Key Information:

Vendor
Mitrastar
Status
Gpt-2541gnac
Vendor
CVE Published:
15 October 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A significant OS command injection vulnerability has been identified in the MitraStar GPT-2541GNAC, specifically within the Firewall Settings Page located at /cgi-bin/settings-firewall.cgi. This flaw arises when the SrcInterface argument is manipulated, allowing malicious actors to execute arbitrary OS commands remotely. The vulnerability poses a severe risk as it can be exploited from outside the affected networks. Despite attempts to notify the vendor regarding this security issue, there have been challenges with the official communication channels. This vulnerability underscores the necessity for organizations using affected products to implement robust security measures and ensure timely updates to mitigate potential attacks.

Affected Version(s)

GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
4.7
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

peritocibernetico (VulDB User)
.