A vulnerability, which was classified as critical, was found in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26. Affected is an unknown function of the file /cgi-bin/settings-firewall.cgi of the component Firewall Settings Page. The manipulation of the argument SrcInterface leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
History

Tue, 15 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Mitrastar
Mitrastar gpt-2541gnac
CPEs cpe:2.3:h:mitrastar:gpt-2541gnac:-:*:*:*:*:*:*:*
Vendors & Products Mitrastar
Mitrastar gpt-2541gnac
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 15 Oct 2024 13:00:00 +0000

Type Values Removed Values Added
Description A vulnerability, which was classified as critical, was found in MitraStar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26. Affected is an unknown function of the file /cgi-bin/settings-firewall.cgi of the component Firewall Settings Page. The manipulation of the argument SrcInterface leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
Title MitraStar GPT-2541GNAC Firewall Settings Page settings-firewall.cgi os command injection
Weaknesses CWE-78
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published: 2024-10-15T12:31:04.419Z

Updated: 2024-10-15T13:27:02.177Z

Reserved: 2024-10-15T05:58:52.332Z

Link: CVE-2024-9977

cve-icon Vulnrichment

Updated: 2024-10-15T13:26:54.873Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-15T13:15:11.457

Modified: 2024-10-16T16:38:43.170

Link: CVE-2024-9977

cve-icon Redhat

No data.