- Description
- Inteno routers have a JUCI ACL misconfiguration that allows the "user" account to read files, write to files, and add root SSH keys via JSON commands to ubus. (Exploitation is sometimes easy because the "user" password might be "user" or might match the Wi-Fi key.)
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.0
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
- nvd@nist.gov
- CWE-269
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intenogroup:inteno_router_firmware:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DC291C7C-0D3F-4D00-A8C9-7B0A437FCA2A"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intenogroup:inteno_router:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A62DBDCB-B236-427F-A1E4-C44C8D7296C6"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]