The QCMAP_CLI utility in the Qualcomm QCMAP software suite prior to versions released in October 2020 uses a system() call without validating the input, while handling a SetGatewayUrl() request. A local attacker with shell access can pass shell metacharacters and run arbitrary commands. If QCMAP_CLI can be run via sudo or setuid, this also allows elevating privileges to root. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: VDOO

Published: 2020-10-15T15:12:56

Updated: 2024-08-04T15:49:06.305Z

Reserved: 2020-09-23T00:00:00

Link: CVE-2020-25859

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2020-10-15T16:15:12.180

Modified: 2020-10-28T15:15:25.427

Link: CVE-2020-25859

cve-icon Redhat

No data.