Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2017-17867
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-04 Jan, 2018 | 19:29
Updated At-07 Nov, 2023 | 02:41

Inteno iopsys 2.0-3.14 and 4.0 devices allow remote authenticated users to execute arbitrary OS commands by modifying the leasetrigger field in the odhcpd configuration to specify an arbitrary program, as demonstrated by a program located on an SMB share. This issue existed because the /etc/uci-defaults directory was not being used to secure the OpenWrt configuration.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.08.8HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.09.0HIGH
AV:N/AC:L/Au:S/C:C/I:C/A:C
CPE Matches

intenogroup
intenogroup
>>iopsys>>Versions from 2.0(inclusive) to 3.14(inclusive)
cpe:2.3:h:intenogroup:iopsys:*:*:*:*:*:*:*:*
intenogroup
intenogroup
>>iopsys>>4.0
cpe:2.3:h:intenogroup:iopsys:4.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-732Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://public.inteno.se/?p=feed-inteno-openwrt.git%3Ba=commit%3Bh=efcc985a721107e72a66da4db66891ec54441998cve@mitre.org
N/A
https://neonsea.uk/blog/2017/12/23/rce-inteno-iopsys.htmlcve@mitre.org
Exploit
Technical Description
Third Party Advisory
https://www.exploit-db.com/exploits/43428/cve@mitre.org
Exploit
VDB Entry
Third Party Advisory
Change History
0Changes found

Details not found