Description
Juplink RX4-1500 v1.0.3 allows remote attackers to gain root access to the Linux subsystem via an unsanitized exec call (aka Command Line Injection), if the undocumented telnetd service is enabled and the attacker can authenticate as admin from the local network.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-29645 | Juplink RX4-1500 v1.0.3 allows remote attackers to gain root access to the Linux subsystem via an unsanitized exec call (aka Command Line Injection), if the undocumented telnetd service is enabled and the attacker can authenticate as admin from the local network. |
References
| Link | Providers |
|---|---|
| https://cerne.xyz/bugs/CVE-2020-8797.html |
|
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T10:12:10.494Z
Reserved: 2020-02-07T00:00:00.000Z
Link: CVE-2020-8797
No data.
Status : Modified
Published: 2020-04-23T18:15:11.903
Modified: 2024-11-21T05:39:27.510
Link: CVE-2020-8797
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD