The HTTPD binary in multiple ZTE routers has a local file inclusion vulnerability in session_init function. The session -LUA- files are stored in the directory /var/lua_session, the function iterates on all files in this directory and executes them using the function dofile without any validation if it is a valid session file or not. An attacker who is able to write a malicious file in the sessions directory can get RCE as root.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zte
Zte zxhn E1600 Firmware Zte zxhn E2603 Firmware Zte zxhn E2615 Firmware Zte zxhn E2618 Firmware Zte zxhn E500 Firmware Zte zxhn H108n Firmware Zte zxhn H168a Firmware Zte zxhn H168n Firmware Zte zxhn H338a Firmware Zte zxhn Z500 Firmware |
|
Weaknesses | CWE-829 | |
CPEs | cpe:2.3:o:zte:zxhn_e1600_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zte:zxhn_e2603_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zte:zxhn_e2615_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zte:zxhn_e2618_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zte:zxhn_e500_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zte:zxhn_h108n_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zte:zxhn_h168a_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zte:zxhn_h168n_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zte:zxhn_h338a_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:zte:zxhn_z500_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Zte
Zte zxhn E1600 Firmware Zte zxhn E2603 Firmware Zte zxhn E2615 Firmware Zte zxhn E2618 Firmware Zte zxhn E500 Firmware Zte zxhn H108n Firmware Zte zxhn H168a Firmware Zte zxhn H168n Firmware Zte zxhn H338a Firmware Zte zxhn Z500 Firmware |
|
Metrics |
cvssV3_1
|
Mon, 16 Sep 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The HTTPD binary in multiple ZTE routers has a local file inclusion vulnerability in session_init function. The session -LUA- files are stored in the directory /var/lua_session, the function iterates on all files in this directory and executes them using the function dofile without any validation if it is a valid session file or not. An attacker who is able to write a malicious file in the sessions directory can get RCE as root. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-09-16T00:00:00
Updated: 2024-09-18T15:18:27.957Z
Reserved: 2024-08-28T00:00:00
Link: CVE-2024-45416
Vulnrichment
Updated: 2024-09-18T15:18:15.719Z
NVD
Status : Awaiting Analysis
Published: 2024-09-16T21:15:46.003
Modified: 2024-09-20T12:31:20.110
Link: CVE-2024-45416
Redhat
No data.