Crestron AM-100/AM-101 HTTP Endpoint file_transfer.cgi System Command command injection
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
9.7 | $0-$5k | 0.00 |
A vulnerability was found in Crestron AM-100 and AM-101. It has been classified as very critical. This affects an unknown part of the file file_transfer.cgi of the component HTTP Endpoint. The manipulation as part of a System Command leads to a command injection vulnerability. CWE is classifying the issue as CWE-77. The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.
The bug was discovered 05/01/2019. The weakness was disclosed 04/30/2019 (Website). The advisory is shared at exploit-db.com. This vulnerability is uniquely identified as CVE-2019-3929 since 01/03/2019. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details and a public exploit are known. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 02/06/2025). MITRE ATT&CK project uses the attack technique T1202 for this issue.
The exploit is shared for download at exploit-db.com. It is declared as highly functional. The commercial vulnerability scanner Qualys is able to test this issue with plugin 13484 (Crestron AM-100 and AM-101 Multiple Vulnerabilities). The CISA Known Exploited Vulnerabilities Catalog lists this issue since 04/15/2022 with a due date of 05/06/2022:
Apply updates per vendor instructions.
It is possible to mitigate the weakness by firewalling .
The entries VDB-134273, VDB-134274, VDB-134275 and VDB-134276 are pretty similar.
Affected
- Crestron AM-100 1.6.0.2
- Crestron AM-101 2.7.0.1
- Barco wePresent WiPG-1000P 2.3.0.10
- Barco wePresent WiPG-1600W 2.4.1
- Extron ShareLink 200/Extron ShareLink 200 250 2.0.3.4
- Teq AV IT WIPS710 1.1.0.7
- SHARP PN-L703WA 1.4.2.3
- Optoma WPS-Pro 1.0.0.5
- Blackbox HD WPS 1.0.0.5
- InFocus LiteShow3 1.0.16
- InFocus LiteShow4 2.0.0.7
Product
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 9.7
VulDB Base Score: 9.8
VulDB Temp Score: 9.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Command injectionCWE: CWE-77 / CWE-74 / CWE-707
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Highly functional
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
KEV Added: 🔍
KEV Due: 🔍
KEV Remediation: 🔍
KEV Ransomware: 🔍
KEV Notice: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Qualys ID: 🔍
Qualys Name: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: FirewallStatus: 🔍
0-Day Time: 🔍
Timeline
01/03/2019 🔍04/30/2019 🔍
05/01/2019 🔍
05/01/2019 🔍
02/06/2025 🔍
Sources
Advisory: 152715Status: Confirmed
CVE: CVE-2019-3929 (🔍)
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 05/01/2019 02:06 PMUpdated: 02/06/2025 11:41 PM
Changes: 05/01/2019 02:06 PM (59), 06/05/2020 11:16 AM (2), 09/11/2023 12:19 PM (5), 04/25/2024 05:34 PM (25), 08/20/2024 03:27 AM (3), 09/09/2024 10:30 PM (1), 02/06/2025 11:41 PM (1)
Complete: 🔍
Cache ID: 18:4A1:40
No comments yet. Languages: en.
Please log in to comment.