Search criteria
4 vulnerabilities found for GPT-2541GNAC by MitraStar
VAR-201711-0108
Vulnerability from variot - Updated: 2025-04-20 23:40MitraStar GPT-2541GNAC (HGU) 1.00(VNJ0)b1 and DSL-100HN-T1 ES_113WJY0b16 devices allow remote authenticated users to obtain root access by specifying /bin/sh as the command to execute. MitraStar GPT-2541GNAC (HGU) and DSL-100HN-T1 Devices have vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MitraStarGPT-2541GNAC (HGU) and DSL-100HN-T1 are both MitraStar router products. A privilege elevation vulnerability exists in the MitraStarGPT-2541GNAC(HGU)1.00(VNJ0)b1 version and the DSL-100HN-T1ES_113WJY0b16 version
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201711-0108",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "gpt-2541gnac",
"scope": "eq",
"trust": 1.6,
"vendor": "mitrastar",
"version": "1.00\\(vnj0\\)b1"
},
{
"model": "dsl-100hn-t1",
"scope": "eq",
"trust": 1.6,
"vendor": "mitrastar",
"version": "es_113wjy0b16"
},
{
"model": "dsl-100hn-t1",
"scope": "eq",
"trust": 0.8,
"vendor": "mitrastar corp",
"version": "es_113wjy0b16"
},
{
"model": "gpt-2541gnac",
"scope": "eq",
"trust": 0.8,
"vendor": "mitrastar corp",
"version": "1.00(vnj0)b1"
},
{
"model": "gpt-2541gnac 1.00 b1",
"scope": null,
"trust": 0.6,
"vendor": "mitrastar",
"version": null
},
{
"model": "dsl-100hn-t1 es 113wjy0b16",
"scope": null,
"trust": 0.6,
"vendor": "mitrastar",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33284"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009816"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-167"
},
{
"db": "NVD",
"id": "CVE-2017-16522"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:mitrastar:gpt-2541gnac_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:mitrastar:dsl-100hn-t1_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-009816"
}
]
},
"cve": "CVE-2017-16522",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "CVE-2017-16522",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2017-33284",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "VHN-107453",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2017-16522",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-16522",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2017-16522",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2017-33284",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201711-167",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-107453",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33284"
},
{
"db": "VULHUB",
"id": "VHN-107453"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009816"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-167"
},
{
"db": "NVD",
"id": "CVE-2017-16522"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "MitraStar GPT-2541GNAC (HGU) 1.00(VNJ0)b1 and DSL-100HN-T1 ES_113WJY0b16 devices allow remote authenticated users to obtain root access by specifying /bin/sh as the command to execute. MitraStar GPT-2541GNAC (HGU) and DSL-100HN-T1 Devices have vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MitraStarGPT-2541GNAC (HGU) and DSL-100HN-T1 are both MitraStar router products. A privilege elevation vulnerability exists in the MitraStarGPT-2541GNAC(HGU)1.00(VNJ0)b1 version and the DSL-100HN-T1ES_113WJY0b16 version",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-16522"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009816"
},
{
"db": "CNVD",
"id": "CNVD-2017-33284"
},
{
"db": "VULHUB",
"id": "VHN-107453"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-16522",
"trust": 3.1
},
{
"db": "PACKETSTORM",
"id": "144805",
"trust": 2.5
},
{
"db": "EXPLOIT-DB",
"id": "43061",
"trust": 2.3
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009816",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201711-167",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-33284",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-107453",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33284"
},
{
"db": "VULHUB",
"id": "VHN-107453"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009816"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-167"
},
{
"db": "NVD",
"id": "CVE-2017-16522"
}
]
},
"id": "VAR-201711-0108",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33284"
},
{
"db": "VULHUB",
"id": "VHN-107453"
}
],
"trust": 1.7
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33284"
}
]
},
"last_update_date": "2025-04-20T23:40:00.082000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.mitrastar.com/"
},
{
"title": "Patch for MitraStarGPT-2541GNAC (HGU) and DSL-100HN-T1 Privilege Escalation Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/105735"
},
{
"title": "MitraStar GPT-2541GNAC (HGU) and DSL-100HN-T1 Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76154"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33284"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009816"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-167"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-276",
"trust": 1.1
},
{
"problemtype": "CWE-264",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-107453"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009816"
},
{
"db": "NVD",
"id": "CVE-2017-16522"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://packetstormsecurity.com/files/144805/mitrastar-dsl-100hn-t1-gpt-2541gnac-privilege-escalation.html"
},
{
"trust": 2.3,
"url": "https://www.exploit-db.com/exploits/43061/"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-16522"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16522"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33284"
},
{
"db": "VULHUB",
"id": "VHN-107453"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009816"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-167"
},
{
"db": "NVD",
"id": "CVE-2017-16522"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-33284"
},
{
"db": "VULHUB",
"id": "VHN-107453"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009816"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-167"
},
{
"db": "NVD",
"id": "CVE-2017-16522"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-33284"
},
{
"date": "2017-11-03T00:00:00",
"db": "VULHUB",
"id": "VHN-107453"
},
{
"date": "2017-11-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-009816"
},
{
"date": "2017-11-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-167"
},
{
"date": "2017-11-03T17:29:00.207000",
"db": "NVD",
"id": "CVE-2017-16522"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-33284"
},
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-107453"
},
{
"date": "2017-11-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-009816"
},
{
"date": "2019-10-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-167"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-16522"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-167"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "MitraStar GPT-2541GNAC and DSL-100HN-T1 Vulnerabilities related to authorization, authority, and access control in devices",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-009816"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control issues",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-167"
}
],
"trust": 0.6
}
}
VAR-201711-0109
Vulnerability from variot - Updated: 2025-04-20 23:40MitraStar GPT-2541GNAC (HGU) 1.00(VNJ0)b1 and DSL-100HN-T1 ES_113WJY0b16 devices have a zyad1234 password for the zyad1234 account, which is equivalent to root and undocumented. MitraStar GPT-2541GNAC (HGU) and DSL-100HN-T1 The device contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MitraStarGPT-2541GNAC (HGU) and DSL-100HN-T1 are both MitraStar router products. A privilege escalation vulnerability exists in the MitraStarGPT-2541GNAC (HGU) 1.00 (VNJ0) b1 version and the DSL-100HN-T1ES_113WJY0b16 version. The vulnerability of the account originating from zyad1234 is zyad1234. An attacker could exploit this vulnerability to gain root privileges. Multiple MitraStar routers are prone to a local privilege-escalation vulnerability. MitraStar DSL-100HN-T1 and GPT-2541GNAC (HGU) Routers are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201711-0109",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "gpt-2541gnac",
"scope": "eq",
"trust": 1.6,
"vendor": "mitrastar",
"version": "1.00\\(vnj0\\)b1"
},
{
"model": "dsl-100hn-t1",
"scope": "eq",
"trust": 1.6,
"vendor": "mitrastar",
"version": "es_113wjy0b16"
},
{
"model": "dsl-100hn-t1",
"scope": "eq",
"trust": 0.8,
"vendor": "mitrastar corp",
"version": "es_113wjy0b16"
},
{
"model": "gpt-2541gnac",
"scope": "eq",
"trust": 0.8,
"vendor": "mitrastar corp",
"version": "1.00(vnj0)b1"
},
{
"model": "gpt-2541gnac 1.00 b1",
"scope": null,
"trust": 0.6,
"vendor": "mitrastar",
"version": null
},
{
"model": "dsl-100hn-t1 es 113wjy0b16",
"scope": null,
"trust": 0.6,
"vendor": "mitrastar",
"version": null
},
{
"model": "technology mitrastar gpt-2541gnac",
"scope": "eq",
"trust": 0.3,
"vendor": "mitrastar",
"version": "0"
},
{
"model": "technology mitrastar dsl-100hn-t1",
"scope": "eq",
"trust": 0.3,
"vendor": "mitrastar",
"version": "0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33285"
},
{
"db": "BID",
"id": "101672"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009817"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-166"
},
{
"db": "NVD",
"id": "CVE-2017-16523"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:mitrastar:gpt-2541gnac_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:mitrastar:dsl-100hn-t1_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-009817"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "j0lama",
"sources": [
{
"db": "BID",
"id": "101672"
}
],
"trust": 0.3
},
"cve": "CVE-2017-16523",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2017-16523",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2017-33285",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-107454",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2017-16523",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-16523",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2017-16523",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2017-33285",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201711-166",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-107454",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2017-16523",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33285"
},
{
"db": "VULHUB",
"id": "VHN-107454"
},
{
"db": "VULMON",
"id": "CVE-2017-16523"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009817"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-166"
},
{
"db": "NVD",
"id": "CVE-2017-16523"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "MitraStar GPT-2541GNAC (HGU) 1.00(VNJ0)b1 and DSL-100HN-T1 ES_113WJY0b16 devices have a zyad1234 password for the zyad1234 account, which is equivalent to root and undocumented. MitraStar GPT-2541GNAC (HGU) and DSL-100HN-T1 The device contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MitraStarGPT-2541GNAC (HGU) and DSL-100HN-T1 are both MitraStar router products. A privilege escalation vulnerability exists in the MitraStarGPT-2541GNAC (HGU) 1.00 (VNJ0) b1 version and the DSL-100HN-T1ES_113WJY0b16 version. The vulnerability of the account originating from zyad1234 is zyad1234. An attacker could exploit this vulnerability to gain root privileges. Multiple MitraStar routers are prone to a local privilege-escalation vulnerability. \nMitraStar DSL-100HN-T1 and GPT-2541GNAC (HGU) Routers are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-16523"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009817"
},
{
"db": "CNVD",
"id": "CNVD-2017-33285"
},
{
"db": "BID",
"id": "101672"
},
{
"db": "VULHUB",
"id": "VHN-107454"
},
{
"db": "VULMON",
"id": "CVE-2017-16523"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-16523",
"trust": 3.5
},
{
"db": "BID",
"id": "101672",
"trust": 2.7
},
{
"db": "PACKETSTORM",
"id": "144805",
"trust": 2.6
},
{
"db": "EXPLOIT-DB",
"id": "43061",
"trust": 2.4
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009817",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201711-166",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2017-33285",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-107454",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2017-16523",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33285"
},
{
"db": "VULHUB",
"id": "VHN-107454"
},
{
"db": "VULMON",
"id": "CVE-2017-16523"
},
{
"db": "BID",
"id": "101672"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009817"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-166"
},
{
"db": "NVD",
"id": "CVE-2017-16523"
}
]
},
"id": "VAR-201711-0109",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33285"
},
{
"db": "VULHUB",
"id": "VHN-107454"
}
],
"trust": 1.7
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33285"
}
]
},
"last_update_date": "2025-04-20T23:40:00.043000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.mitrastar.com/"
},
{
"title": "Patch for MitraStarGPT-2541GNAC (HGU) and DSL-100HN-T1 Privilege Escalation Vulnerability (CNVD-2017-33285)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/105737"
},
{
"title": "MitraStar GPT-2541GNAC (HGU) and DSL-100HN-T1 Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76153"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33285"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009817"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-166"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-255",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-107454"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009817"
},
{
"db": "NVD",
"id": "CVE-2017-16523"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "https://packetstormsecurity.com/files/144805/mitrastar-dsl-100hn-t1-gpt-2541gnac-privilege-escalation.html"
},
{
"trust": 2.4,
"url": "https://www.exploit-db.com/exploits/43061/"
},
{
"trust": 1.9,
"url": "http://www.securityfocus.com/bid/101672"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-16523"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16523"
},
{
"trust": 0.3,
"url": "http://www.mitrastar.com/"
},
{
"trust": 0.3,
"url": "http://jolama.es/temas/router-attack/index.php"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-33285"
},
{
"db": "VULHUB",
"id": "VHN-107454"
},
{
"db": "VULMON",
"id": "CVE-2017-16523"
},
{
"db": "BID",
"id": "101672"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009817"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-166"
},
{
"db": "NVD",
"id": "CVE-2017-16523"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2017-33285"
},
{
"db": "VULHUB",
"id": "VHN-107454"
},
{
"db": "VULMON",
"id": "CVE-2017-16523"
},
{
"db": "BID",
"id": "101672"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-009817"
},
{
"db": "CNNVD",
"id": "CNNVD-201711-166"
},
{
"db": "NVD",
"id": "CVE-2017-16523"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-33285"
},
{
"date": "2017-11-03T00:00:00",
"db": "VULHUB",
"id": "VHN-107454"
},
{
"date": "2017-11-03T00:00:00",
"db": "VULMON",
"id": "CVE-2017-16523"
},
{
"date": "2017-10-28T00:00:00",
"db": "BID",
"id": "101672"
},
{
"date": "2017-11-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-009817"
},
{
"date": "2017-11-08T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-166"
},
{
"date": "2017-11-03T17:29:00.253000",
"db": "NVD",
"id": "CVE-2017-16523"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-11-09T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-33285"
},
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-107454"
},
{
"date": "2019-10-03T00:00:00",
"db": "VULMON",
"id": "CVE-2017-16523"
},
{
"date": "2017-12-19T22:36:00",
"db": "BID",
"id": "101672"
},
{
"date": "2017-11-22T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-009817"
},
{
"date": "2019-10-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201711-166"
},
{
"date": "2025-04-20T01:37:25.860000",
"db": "NVD",
"id": "CVE-2017-16523"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-166"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "MitraStar GPT-2541GNAC and DSL-100HN-T1 Vulnerabilities related to certificate and password management in devices",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-009817"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "trust management problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201711-166"
}
],
"trust": 0.6
}
}
CVE-2024-9977 (GCVE-0-2024-9977)
Vulnerability from nvd – Published: 2024-10-15 12:31 – Updated: 2024-10-15 13:27- CWE-78 - OS Command Injection
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MitraStar | GPT-2541GNAC |
Affected:
BR_g5.6_1.11(WVK.0)b26
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:h:mitrastar:gpt-2541gnac:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gpt-2541gnac",
"vendor": "mitrastar",
"versions": [
{
"status": "affected",
"version": "BR_g5.6_1.11(WVK.0)b26"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-9977",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-15T13:22:50.398862Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-15T13:27:02.177Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"Firewall Settings Page"
],
"product": "GPT-2541GNAC",
"vendor": "MitraStar",
"versions": [
{
"status": "affected",
"version": "BR_g5.6_1.11(WVK.0)b26"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "peritocibernetico (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26. Affected is an unknown function of the file /cgi-bin/settings-firewall.cgi of the component Firewall Settings Page. The manipulation of the argument SrcInterface leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. We tried to contact the vendor early about the disclosure but the official mail address was not working properly."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26 gefunden. Sie wurde als kritisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei /cgi-bin/settings-firewall.cgi der Komponente Firewall Settings Page. Durch das Beeinflussen des Arguments SrcInterface mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5.8,
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-15T12:31:04.419Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-280344 | MitraStar GPT-2541GNAC Firewall Settings Page settings-firewall.cgi os command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.280344"
},
{
"name": "VDB-280344 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.280344"
},
{
"name": "Submit #423561 | Mitrastar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26 OS Command Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.423561"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/peritocibernetico/VivoCodeExecutionFirewall/"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-10-15T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-10-15T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-10-15T08:05:28.000Z",
"value": "VulDB entry last update"
}
],
"title": "MitraStar GPT-2541GNAC Firewall Settings Page settings-firewall.cgi os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-9977",
"datePublished": "2024-10-15T12:31:04.419Z",
"dateReserved": "2024-10-15T05:58:52.332Z",
"dateUpdated": "2024-10-15T13:27:02.177Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-9977 (GCVE-0-2024-9977)
Vulnerability from cvelistv5 – Published: 2024-10-15 12:31 – Updated: 2024-10-15 13:27- CWE-78 - OS Command Injection
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| MitraStar | GPT-2541GNAC |
Affected:
BR_g5.6_1.11(WVK.0)b26
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:h:mitrastar:gpt-2541gnac:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gpt-2541gnac",
"vendor": "mitrastar",
"versions": [
{
"status": "affected",
"version": "BR_g5.6_1.11(WVK.0)b26"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-9977",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-15T13:22:50.398862Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-15T13:27:02.177Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"Firewall Settings Page"
],
"product": "GPT-2541GNAC",
"vendor": "MitraStar",
"versions": [
{
"status": "affected",
"version": "BR_g5.6_1.11(WVK.0)b26"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "peritocibernetico (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26. Affected is an unknown function of the file /cgi-bin/settings-firewall.cgi of the component Firewall Settings Page. The manipulation of the argument SrcInterface leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. We tried to contact the vendor early about the disclosure but the official mail address was not working properly."
},
{
"lang": "de",
"value": "Es wurde eine Schwachstelle in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26 gefunden. Sie wurde als kritisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei /cgi-bin/settings-firewall.cgi der Komponente Firewall Settings Page. Durch das Beeinflussen des Arguments SrcInterface mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 5.8,
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-15T12:31:04.419Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-280344 | MitraStar GPT-2541GNAC Firewall Settings Page settings-firewall.cgi os command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.280344"
},
{
"name": "VDB-280344 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.280344"
},
{
"name": "Submit #423561 | Mitrastar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26 OS Command Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.423561"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/peritocibernetico/VivoCodeExecutionFirewall/"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-10-15T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2024-10-15T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2024-10-15T08:05:28.000Z",
"value": "VulDB entry last update"
}
],
"title": "MitraStar GPT-2541GNAC Firewall Settings Page settings-firewall.cgi os command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2024-9977",
"datePublished": "2024-10-15T12:31:04.419Z",
"dateReserved": "2024-10-15T05:58:52.332Z",
"dateUpdated": "2024-10-15T13:27:02.177Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}