[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Siklu EtherHaul < 7.4.0 Remote Command Execution Vulnerability

Author
Ian Ling
Risk
[
Security Risk Critical
]
0day-ID
0day-ID-27122
Category
remote exploits
Date add
24-02-2017
Platform
hardware
[+] Credits: Ian Ling
[+] Website: iancaling.com
[+] Source: http://blog.iancaling.com/post/155127766533

Vendor:
=================
https://www.siklu.com/

Product:
======================
-Siklu EtherHaul (EH-*)

Vulnerability Details:
=====================

Siklu EtherHaul devices are vulnerable to an unauthenticated remote command
execution (RCE) vulnerability. This vulnerability allows an attacker to
execute commands and retrieve information such as usernames and plaintext
passwords from the device with no authentication.

Affected versions:
<7.4.0

Impact:
The remote attacker has full admin access to the device.


Disclosure Timeline:
===================================
Vendor Notification: December 22, 2016
Initial Response: December 22, 2016
Patched by Vendor: February 13th, 2017
Public Disclosure: February 20th, 2017

Exploitation Technique:
=======================
Remote, no authentication required

Severity Level:
================
Critical

#  0day.today [2024-11-15]  #