The HTTPD binary in multiple ZTE routers has a local file inclusion vulnerability in session_init function. The session -LUA- files are stored in the directory /var/lua_session, the function iterates on all files in this directory and executes them using the function dofile without any validation if it is a valid session file or not. An attacker who is able to write a malicious file in the sessions directory can get RCE as root.
History

Wed, 18 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Zte
Zte zxhn E1600 Firmware
Zte zxhn E2603 Firmware
Zte zxhn E2615 Firmware
Zte zxhn E2618 Firmware
Zte zxhn E500 Firmware
Zte zxhn H108n Firmware
Zte zxhn H168a Firmware
Zte zxhn H168n Firmware
Zte zxhn H338a Firmware
Zte zxhn Z500 Firmware
Weaknesses CWE-829
CPEs cpe:2.3:o:zte:zxhn_e1600_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_e2603_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_e2615_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_e2618_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_e500_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_h108n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_h168a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_h168n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_h338a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zte:zxhn_z500_firmware:*:*:*:*:*:*:*:*
Vendors & Products Zte
Zte zxhn E1600 Firmware
Zte zxhn E2603 Firmware
Zte zxhn E2615 Firmware
Zte zxhn E2618 Firmware
Zte zxhn E500 Firmware
Zte zxhn H108n Firmware
Zte zxhn H168a Firmware
Zte zxhn H168n Firmware
Zte zxhn H338a Firmware
Zte zxhn Z500 Firmware
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
Description The HTTPD binary in multiple ZTE routers has a local file inclusion vulnerability in session_init function. The session -LUA- files are stored in the directory /var/lua_session, the function iterates on all files in this directory and executes them using the function dofile without any validation if it is a valid session file or not. An attacker who is able to write a malicious file in the sessions directory can get RCE as root.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-09-16T00:00:00

Updated: 2024-09-18T15:18:27.957Z

Reserved: 2024-08-28T00:00:00

Link: CVE-2024-45416

cve-icon Vulnrichment

Updated: 2024-09-18T15:18:15.719Z

cve-icon NVD

Status : Received

Published: 2024-09-16T21:15:46.003

Modified: 2024-09-18T16:35:13.743

Link: CVE-2024-45416

cve-icon Redhat

No data.