إرسال #573493: Netcore NBR1005GPE; COVER5; NBR100; NBR200; B6; NAP930; NAP830 NBR1005GPEV2_V1.3.241107.015153; NBR100V2 V1.3.240614.030928; NBR200V2 V1.3.241127.071246; NAP930 V0.1.241010.141410; NAP830 V0. Command Injectionالمعلومات

عنوانNetcore NBR1005GPE; COVER5; NBR100; NBR200; B6; NAP930; NAP830 NBR1005GPEV2_V1.3.241107.015153; NBR100V2 V1.3.240614.030928; NBR200V2 V1.3.241127.071246; NAP930 V0.1.241010.141410; NAP830 V0. Command Injection
الوصفVendor's Website(Domestic URL):https://www.netcoretec.com/ (Foreign URL):https://www.netis-systems.com/ There is an arbitrary command injection vulnerability after authorization in multiple router and wireless AP products of Netcore. This vulnerability lies in the callback function registered by /usr/bin/routerd for the passwd_set method. It fails to conduct a legitimacy check on the passwd field. Attackers can exploit this vulnerability to establish a reverse shell connection to the router remotely and execute arbitrary commands. Discoverer: Exploo0Osion. Please contact Netcore (Netis Technology) technical support to fix this vulnerability in a timely manner.
المصدر⚠️ https://anonymous.4open.science/r/netcore_command_injection2-4583F2DA
المستخدم
 ricardo123 (UID 83496)
ارسال08/05/2025 04:41 AM (12 أشهر منذ)
الاعتدال24/05/2025 03:37 PM (16 days later)
الحالةتمت الموافقة
إدخال VulDB310234 [Netcore NBR200V2 حتى 20250508 HTTP Header /usr/bin/routerd passwd_set pwd تجاوز الصلاحيات]
النقاط20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!