OS Command Injection Vulnerability in MitraStar GPT-2541GNAC Firewall Settings
CVE-2024-9977
Key Information:
- Vendor
- Mitrastar
- Status
- Gpt-2541gnac
- Vendor
- CVE Published:
- 15 October 2024
Badges
Summary
A significant OS command injection vulnerability has been identified in the MitraStar GPT-2541GNAC, specifically within the Firewall Settings Page located at /cgi-bin/settings-firewall.cgi. This flaw arises when the SrcInterface argument is manipulated, allowing malicious actors to execute arbitrary OS commands remotely. The vulnerability poses a severe risk as it can be exploited from outside the affected networks. Despite attempts to notify the vendor regarding this security issue, there have been challenges with the official communication channels. This vulnerability underscores the necessity for organizations using affected products to implement robust security measures and ensure timely updates to mitigate potential attacks.
Affected Version(s)
GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved