Search criteria

4 vulnerabilities found for GPT-2541GNAC by MitraStar

VAR-201711-0108

Vulnerability from variot - Updated: 2025-04-20 23:40

MitraStar GPT-2541GNAC (HGU) 1.00(VNJ0)b1 and DSL-100HN-T1 ES_113WJY0b16 devices allow remote authenticated users to obtain root access by specifying /bin/sh as the command to execute. MitraStar GPT-2541GNAC (HGU) and DSL-100HN-T1 Devices have vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MitraStarGPT-2541GNAC (HGU) and DSL-100HN-T1 are both MitraStar router products. A privilege elevation vulnerability exists in the MitraStarGPT-2541GNAC(HGU)1.00(VNJ0)b1 version and the DSL-100HN-T1ES_113WJY0b16 version

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0108",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "gpt-2541gnac",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mitrastar",
        "version": "1.00\\(vnj0\\)b1"
      },
      {
        "model": "dsl-100hn-t1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mitrastar",
        "version": "es_113wjy0b16"
      },
      {
        "model": "dsl-100hn-t1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mitrastar corp",
        "version": "es_113wjy0b16"
      },
      {
        "model": "gpt-2541gnac",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mitrastar corp",
        "version": "1.00(vnj0)b1"
      },
      {
        "model": "gpt-2541gnac 1.00 b1",
        "scope": null,
        "trust": 0.6,
        "vendor": "mitrastar",
        "version": null
      },
      {
        "model": "dsl-100hn-t1 es 113wjy0b16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mitrastar",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33284"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009816"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-167"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16522"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:mitrastar:gpt-2541gnac_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:mitrastar:dsl-100hn-t1_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009816"
      }
    ]
  },
  "cve": "CVE-2017-16522",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "CVE-2017-16522",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2017-33284",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "VHN-107453",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.8,
            "id": "CVE-2017-16522",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-16522",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-16522",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-33284",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201711-167",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-107453",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33284"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107453"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009816"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-167"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16522"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "MitraStar GPT-2541GNAC (HGU) 1.00(VNJ0)b1 and DSL-100HN-T1 ES_113WJY0b16 devices allow remote authenticated users to obtain root access by specifying /bin/sh as the command to execute. MitraStar GPT-2541GNAC (HGU) and DSL-100HN-T1 Devices have vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MitraStarGPT-2541GNAC (HGU) and DSL-100HN-T1 are both MitraStar router products. A privilege elevation vulnerability exists in the MitraStarGPT-2541GNAC(HGU)1.00(VNJ0)b1 version and the DSL-100HN-T1ES_113WJY0b16 version",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-16522"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009816"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-33284"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107453"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-16522",
        "trust": 3.1
      },
      {
        "db": "PACKETSTORM",
        "id": "144805",
        "trust": 2.5
      },
      {
        "db": "EXPLOIT-DB",
        "id": "43061",
        "trust": 2.3
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009816",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-167",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-33284",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-107453",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33284"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107453"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009816"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-167"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16522"
      }
    ]
  },
  "id": "VAR-201711-0108",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33284"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107453"
      }
    ],
    "trust": 1.7
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33284"
      }
    ]
  },
  "last_update_date": "2025-04-20T23:40:00.082000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.mitrastar.com/"
      },
      {
        "title": "Patch for MitraStarGPT-2541GNAC (HGU) and DSL-100HN-T1 Privilege Escalation Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/105735"
      },
      {
        "title": "MitraStar GPT-2541GNAC (HGU)  and DSL-100HN-T1 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76154"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33284"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009816"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-167"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-276",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-264",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-107453"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009816"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16522"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://packetstormsecurity.com/files/144805/mitrastar-dsl-100hn-t1-gpt-2541gnac-privilege-escalation.html"
      },
      {
        "trust": 2.3,
        "url": "https://www.exploit-db.com/exploits/43061/"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16522"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16522"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33284"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107453"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009816"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-167"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16522"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33284"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107453"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009816"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-167"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16522"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-33284"
      },
      {
        "date": "2017-11-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-107453"
      },
      {
        "date": "2017-11-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-009816"
      },
      {
        "date": "2017-11-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-167"
      },
      {
        "date": "2017-11-03T17:29:00.207000",
        "db": "NVD",
        "id": "CVE-2017-16522"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-33284"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-107453"
      },
      {
        "date": "2017-11-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-009816"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-167"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2017-16522"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-167"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "MitraStar GPT-2541GNAC and  DSL-100HN-T1 Vulnerabilities related to authorization, authority, and access control in devices",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009816"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control issues",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-167"
      }
    ],
    "trust": 0.6
  }
}

VAR-201711-0109

Vulnerability from variot - Updated: 2025-04-20 23:40

MitraStar GPT-2541GNAC (HGU) 1.00(VNJ0)b1 and DSL-100HN-T1 ES_113WJY0b16 devices have a zyad1234 password for the zyad1234 account, which is equivalent to root and undocumented. MitraStar GPT-2541GNAC (HGU) and DSL-100HN-T1 The device contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MitraStarGPT-2541GNAC (HGU) and DSL-100HN-T1 are both MitraStar router products. A privilege escalation vulnerability exists in the MitraStarGPT-2541GNAC (HGU) 1.00 (VNJ0) b1 version and the DSL-100HN-T1ES_113WJY0b16 version. The vulnerability of the account originating from zyad1234 is zyad1234. An attacker could exploit this vulnerability to gain root privileges. Multiple MitraStar routers are prone to a local privilege-escalation vulnerability. MitraStar DSL-100HN-T1 and GPT-2541GNAC (HGU) Routers are vulnerable

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0109",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "gpt-2541gnac",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mitrastar",
        "version": "1.00\\(vnj0\\)b1"
      },
      {
        "model": "dsl-100hn-t1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "mitrastar",
        "version": "es_113wjy0b16"
      },
      {
        "model": "dsl-100hn-t1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mitrastar corp",
        "version": "es_113wjy0b16"
      },
      {
        "model": "gpt-2541gnac",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "mitrastar corp",
        "version": "1.00(vnj0)b1"
      },
      {
        "model": "gpt-2541gnac 1.00 b1",
        "scope": null,
        "trust": 0.6,
        "vendor": "mitrastar",
        "version": null
      },
      {
        "model": "dsl-100hn-t1 es 113wjy0b16",
        "scope": null,
        "trust": 0.6,
        "vendor": "mitrastar",
        "version": null
      },
      {
        "model": "technology mitrastar gpt-2541gnac",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mitrastar",
        "version": "0"
      },
      {
        "model": "technology mitrastar dsl-100hn-t1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "mitrastar",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33285"
      },
      {
        "db": "BID",
        "id": "101672"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009817"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-166"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16523"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:mitrastar:gpt-2541gnac_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:mitrastar:dsl-100hn-t1_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009817"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "j0lama",
    "sources": [
      {
        "db": "BID",
        "id": "101672"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-16523",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-16523",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CNVD-2017-33285",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-107454",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-16523",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-16523",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-16523",
            "trust": 0.8,
            "value": "Critical"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-33285",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201711-166",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-107454",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2017-16523",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33285"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107454"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16523"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009817"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-166"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16523"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "MitraStar GPT-2541GNAC (HGU) 1.00(VNJ0)b1 and DSL-100HN-T1 ES_113WJY0b16 devices have a zyad1234 password for the zyad1234 account, which is equivalent to root and undocumented. MitraStar GPT-2541GNAC (HGU) and DSL-100HN-T1 The device contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. MitraStarGPT-2541GNAC (HGU) and DSL-100HN-T1 are both MitraStar router products. A privilege escalation vulnerability exists in the MitraStarGPT-2541GNAC (HGU) 1.00 (VNJ0) b1 version and the DSL-100HN-T1ES_113WJY0b16 version. The vulnerability of the account originating from zyad1234 is zyad1234. An attacker could exploit this vulnerability to gain root privileges. Multiple MitraStar routers are prone to a local privilege-escalation vulnerability. \nMitraStar DSL-100HN-T1 and GPT-2541GNAC (HGU) Routers are vulnerable",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-16523"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009817"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-33285"
      },
      {
        "db": "BID",
        "id": "101672"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107454"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16523"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-16523",
        "trust": 3.5
      },
      {
        "db": "BID",
        "id": "101672",
        "trust": 2.7
      },
      {
        "db": "PACKETSTORM",
        "id": "144805",
        "trust": 2.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "43061",
        "trust": 2.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009817",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-166",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-33285",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-107454",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16523",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33285"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107454"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16523"
      },
      {
        "db": "BID",
        "id": "101672"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009817"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-166"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16523"
      }
    ]
  },
  "id": "VAR-201711-0109",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33285"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107454"
      }
    ],
    "trust": 1.7
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33285"
      }
    ]
  },
  "last_update_date": "2025-04-20T23:40:00.043000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.mitrastar.com/"
      },
      {
        "title": "Patch for MitraStarGPT-2541GNAC (HGU) and DSL-100HN-T1 Privilege Escalation Vulnerability (CNVD-2017-33285)",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/105737"
      },
      {
        "title": "MitraStar GPT-2541GNAC (HGU)  and DSL-100HN-T1 Security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76153"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33285"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009817"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-166"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-255",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-107454"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009817"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16523"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "https://packetstormsecurity.com/files/144805/mitrastar-dsl-100hn-t1-gpt-2541gnac-privilege-escalation.html"
      },
      {
        "trust": 2.4,
        "url": "https://www.exploit-db.com/exploits/43061/"
      },
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/101672"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16523"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16523"
      },
      {
        "trust": 0.3,
        "url": "http://www.mitrastar.com/"
      },
      {
        "trust": 0.3,
        "url": "http://jolama.es/temas/router-attack/index.php"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33285"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107454"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16523"
      },
      {
        "db": "BID",
        "id": "101672"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009817"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-166"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16523"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-33285"
      },
      {
        "db": "VULHUB",
        "id": "VHN-107454"
      },
      {
        "db": "VULMON",
        "id": "CVE-2017-16523"
      },
      {
        "db": "BID",
        "id": "101672"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009817"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-166"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-16523"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-33285"
      },
      {
        "date": "2017-11-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-107454"
      },
      {
        "date": "2017-11-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-16523"
      },
      {
        "date": "2017-10-28T00:00:00",
        "db": "BID",
        "id": "101672"
      },
      {
        "date": "2017-11-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-009817"
      },
      {
        "date": "2017-11-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-166"
      },
      {
        "date": "2017-11-03T17:29:00.253000",
        "db": "NVD",
        "id": "CVE-2017-16523"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-11-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-33285"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-107454"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2017-16523"
      },
      {
        "date": "2017-12-19T22:36:00",
        "db": "BID",
        "id": "101672"
      },
      {
        "date": "2017-11-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-009817"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201711-166"
      },
      {
        "date": "2025-04-20T01:37:25.860000",
        "db": "NVD",
        "id": "CVE-2017-16523"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-166"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "MitraStar GPT-2541GNAC and  DSL-100HN-T1 Vulnerabilities related to certificate and password management in devices",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-009817"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201711-166"
      }
    ],
    "trust": 0.6
  }
}

CVE-2024-9977 (GCVE-0-2024-9977)

Vulnerability from nvd – Published: 2024-10-15 12:31 – Updated: 2024-10-15 13:27
VLAI?
Title
MitraStar GPT-2541GNAC Firewall Settings Page settings-firewall.cgi os command injection
Summary
A vulnerability, which was classified as critical, was found in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26. Affected is an unknown function of the file /cgi-bin/settings-firewall.cgi of the component Firewall Settings Page. The manipulation of the argument SrcInterface leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
CWE
  • CWE-78 - OS Command Injection
Assigner
References
Impacted products
Vendor Product Version
MitraStar GPT-2541GNAC Affected: BR_g5.6_1.11(WVK.0)b26
Create a notification for this product.
Credits
peritocibernetico (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mitrastar:gpt-2541gnac:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gpt-2541gnac",
            "vendor": "mitrastar",
            "versions": [
              {
                "status": "affected",
                "version": "BR_g5.6_1.11(WVK.0)b26"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-9977",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-15T13:22:50.398862Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-15T13:27:02.177Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Firewall Settings Page"
          ],
          "product": "GPT-2541GNAC",
          "vendor": "MitraStar",
          "versions": [
            {
              "status": "affected",
              "version": "BR_g5.6_1.11(WVK.0)b26"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "peritocibernetico (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability, which was classified as critical, was found in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26. Affected is an unknown function of the file /cgi-bin/settings-firewall.cgi of the component Firewall Settings Page. The manipulation of the argument SrcInterface leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. We tried to contact the vendor early about the disclosure but the official mail address was not working properly."
        },
        {
          "lang": "de",
          "value": "Es wurde eine Schwachstelle in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26 gefunden. Sie wurde als kritisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei /cgi-bin/settings-firewall.cgi der Komponente Firewall Settings Page. Durch das Beeinflussen des Arguments SrcInterface mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 5.8,
            "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "OS Command Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-15T12:31:04.419Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-280344 | MitraStar GPT-2541GNAC Firewall Settings Page settings-firewall.cgi os command injection",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.280344"
        },
        {
          "name": "VDB-280344 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.280344"
        },
        {
          "name": "Submit #423561 | Mitrastar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26 OS Command Injection",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.423561"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/peritocibernetico/VivoCodeExecutionFirewall/"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-10-15T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2024-10-15T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2024-10-15T08:05:28.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "MitraStar GPT-2541GNAC Firewall Settings Page settings-firewall.cgi os command injection"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2024-9977",
    "datePublished": "2024-10-15T12:31:04.419Z",
    "dateReserved": "2024-10-15T05:58:52.332Z",
    "dateUpdated": "2024-10-15T13:27:02.177Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-9977 (GCVE-0-2024-9977)

Vulnerability from cvelistv5 – Published: 2024-10-15 12:31 – Updated: 2024-10-15 13:27
VLAI?
Title
MitraStar GPT-2541GNAC Firewall Settings Page settings-firewall.cgi os command injection
Summary
A vulnerability, which was classified as critical, was found in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26. Affected is an unknown function of the file /cgi-bin/settings-firewall.cgi of the component Firewall Settings Page. The manipulation of the argument SrcInterface leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
CWE
  • CWE-78 - OS Command Injection
Assigner
References
Impacted products
Vendor Product Version
MitraStar GPT-2541GNAC Affected: BR_g5.6_1.11(WVK.0)b26
Create a notification for this product.
Credits
peritocibernetico (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:mitrastar:gpt-2541gnac:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "gpt-2541gnac",
            "vendor": "mitrastar",
            "versions": [
              {
                "status": "affected",
                "version": "BR_g5.6_1.11(WVK.0)b26"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-9977",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-15T13:22:50.398862Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-15T13:27:02.177Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Firewall Settings Page"
          ],
          "product": "GPT-2541GNAC",
          "vendor": "MitraStar",
          "versions": [
            {
              "status": "affected",
              "version": "BR_g5.6_1.11(WVK.0)b26"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "peritocibernetico (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability, which was classified as critical, was found in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26. Affected is an unknown function of the file /cgi-bin/settings-firewall.cgi of the component Firewall Settings Page. The manipulation of the argument SrcInterface leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. We tried to contact the vendor early about the disclosure but the official mail address was not working properly."
        },
        {
          "lang": "de",
          "value": "Es wurde eine Schwachstelle in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26 gefunden. Sie wurde als kritisch eingestuft. Betroffen hiervon ist ein unbekannter Ablauf der Datei /cgi-bin/settings-firewall.cgi der Komponente Firewall Settings Page. Durch das Beeinflussen des Arguments SrcInterface mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 5.8,
            "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "OS Command Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-15T12:31:04.419Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-280344 | MitraStar GPT-2541GNAC Firewall Settings Page settings-firewall.cgi os command injection",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.280344"
        },
        {
          "name": "VDB-280344 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.280344"
        },
        {
          "name": "Submit #423561 | Mitrastar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26 OS Command Injection",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.423561"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/peritocibernetico/VivoCodeExecutionFirewall/"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-10-15T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2024-10-15T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2024-10-15T08:05:28.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "MitraStar GPT-2541GNAC Firewall Settings Page settings-firewall.cgi os command injection"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2024-9977",
    "datePublished": "2024-10-15T12:31:04.419Z",
    "dateReserved": "2024-10-15T05:58:52.332Z",
    "dateUpdated": "2024-10-15T13:27:02.177Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}