CVE-2018-20218

An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. The login form passes user input directly to a shell command without any kind of escaping or validation in /usr/share/www/check.lp file. An attacker is able to perform command injection using the "password" parameter in the login form.
References
Link Resource
http://seclists.org/fulldisclosure/2019/Feb/48 Exploit Mailing List Third Party Advisory
https://zxsecurity.co.nz/research.html Not Applicable
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:teracue:enc-400_hdmi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:teracue:enc-400_hdmi:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:teracue:enc-400_hdmi2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:teracue:enc-400_hdmi2:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:teracue:enc-400_hdsdi_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:teracue:enc-400_hdsdi:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-03-21 16:00

Updated : 2023-12-10 12:59


NVD link : CVE-2018-20218

Mitre link : CVE-2018-20218

CVE.ORG link : CVE-2018-20218


JSON object : View

Products Affected

teracue

  • enc-400_hdmi2_firmware
  • enc-400_hdmi
  • enc-400_hdsdi
  • enc-400_hdmi_firmware
  • enc-400_hdsdi_firmware
  • enc-400_hdmi2
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')