Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-8331

EPSS 13.76% · P94
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-8331

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered on Securifi Almond, Almond+, and Almond 2015 devices with firmware AL-R096. The device provides a user with the capability of adding new port forwarding rules to the device. It seems that the POST parameters passed in this request to set up routes on the device can be set in such a way that would result in passing commands to a "system" API in the function and thus result in command injection on the device. If the firmware version AL-R096 is dissected using binwalk tool, we obtain a cpio-root archive which contains the filesystem set up on the device that contains all the binaries. The binary "goahead" is the one that has the vulnerable function that recieves the values sent by the POST request. If we open this binary in IDA-pro we will notice that this follows a MIPS little endian format. The function sub_43C280in IDA pro is identified to be receiving the values sent in the POST request and the value set in POST parameter "ip_address" is extracted at address 0x0043C2F0. The POST parameter "ipaddress" is concatenated at address 0x0043C958 and this is passed to a "system" function at address 0x00437284. This allows an attacker to provide the payload of his/her choice and finally take control of the device.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Securifi Almond 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Securifi Almond是一款带有触控屏幕的无线路由器。 使用AL-R096版本固件的Securifi Almond、Almond+和Almond 2015中的端口转发功能存在命令注入漏洞。攻击者可利用该漏洞提交恶意的payload并控制设备。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2017-8331

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-8331

Please Login to view more intelligence information

Same Patch Batch · n/a · 2019-06-18 · 39 CVEs total

CVE-2019-12872dotCMS SQL注入漏洞
CVE-2018-18837Netdata Web application 注入漏洞
CVE-2018-18838Netdata Web application 注入漏洞
CVE-2018-18839Netdata Web application 信息泄露漏洞
CVE-2018-18852CERIO DT-300N 操作系统命令注入漏洞
CVE-2018-18875Columbia Weather Systems Weather MicroServer 跨站脚本漏洞
CVE-2018-18876Columbia Weather Systems Weather MicroServer 路径遍历漏洞
CVE-2018-18877Columbia Weather Systems Weather MicroServer 授权问题漏洞
CVE-2018-18878Columbia Weather Systems Weather MicroServer 输入验证错误漏洞
CVE-2018-18879Columbia Weather Systems Weather MicroServer 代码注入漏洞
CVE-2018-18836Netdata Web application 代码注入漏洞
CVE-2018-18880Columbia Weather Systems Weather MicroServer 跨站脚本漏洞
CVE-2018-18886Helpy 跨站脚本漏洞
CVE-2018-18944Artha 缓冲区错误漏洞
CVE-2018-20013UrBackup 输入验证错误漏洞
CVE-2019-6965Synetics i-doit 跨站脚本漏洞
CVE-2019-7159Open-Xchange OX App Suite 信息泄露漏洞
CVE-2019-10998Phoenix Contact PLCNext AXC F 2152 授权问题漏洞
CVE-2019-12823Pixel&tonic Craft CMS 跨站脚本漏洞
CVE-2017-8328Securifi Almond 跨站请求伪造漏洞

Showing top 20 of 39 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-8331

No comments yet


Leave a comment