Inim Electronics SmartLiving SmartLAN/G/SI <=6.x suffers from an authenticated remote command injection vulnerability. The issue exist due to the 'par' POST parameter not being sanitized when called with the 'testemail' module through web.cgi binary. The vulnerable CGI binary (ELF 32-bit LSB executable, ARM) is calling the 'sh' executable via the system() function to issue a command using the mailx service and its vulnerable string format parameter allowing for OS command injection with root privileges. An attacker can remotely execute system commands as the root user using default credentials and bypass access controls in place.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Inim
Subscribe
|
Smartliving 10100l
Subscribe
Smartliving 10100l Firmware
Subscribe
Smartliving 10100lg3
Subscribe
Smartliving 10100lg3 Firmware
Subscribe
Smartliving 1050
Subscribe
Smartliving 1050 Firmware
Subscribe
Smartliving 1050g3
Subscribe
Smartliving 1050g3 Firmware
Subscribe
Smartliving 505
Subscribe
Smartliving 505 Firmware
Subscribe
Smartliving 515
Subscribe
Smartliving 515 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-14758 | Inim Electronics SmartLiving SmartLAN/G/SI <=6.x suffers from an authenticated remote command injection vulnerability. The issue exist due to the 'par' POST parameter not being sanitized when called with the 'testemail' module through web.cgi binary. The vulnerable CGI binary (ELF 32-bit LSB executable, ARM) is calling the 'sh' executable via the system() function to issue a command using the mailx service and its vulnerable string format parameter allowing for OS command injection with root privileges. An attacker can remotely execute system commands as the root user using default credentials and bypass access controls in place. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T14:30:33.668Z
Reserved: 2020-08-13T00:00:00
Link: CVE-2020-21992
No data.
Status : Modified
Published: 2021-04-29T15:15:10.443
Modified: 2024-11-21T05:12:58.917
Link: CVE-2020-21992
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD