CVE-2017-11361
Published Jul 17, 2017
Last updated 5 years ago
Overview
- Description
- Inteno routers have a JUCI ACL misconfiguration that allows the "user" account to read files, write to files, and add root SSH keys via JSON commands to ubus. (Exploitation is sometimes easy because the "user" password might be "user" or might match the Wi-Fi key.)
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-269
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:intenogroup:inteno_router_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC291C7C-0D3F-4D00-A8C9-7B0A437FCA2A" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:intenogroup:inteno_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A62DBDCB-B236-427F-A1E4-C44C8D7296C6" } ], "operator": "OR" } ], "operator": "AND" } ]