Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-12511— Root Command Injection via MAC Address in SOAP API

EPSS 0.43% · P63
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-12511

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Root Command Injection via MAC Address in SOAP API
Source: NVD (National Vulnerability Database)
Vulnerability Description
In NETGEAR Nighthawk X10-R9000 prior to 1.0.4.26, an attacker may execute arbitrary system commands as root by sending a specially-crafted MAC address to the "NETGEAR Genie" SOAP endpoint at AdvancedQoS:GetCurrentBandwidthByMAC. Although this requires QoS being enabled, advanced QoS being enabled, and a valid authentication JWT, additional vulnerabilities (CVE-2019-12510) allow an attacker to interact with the entire SOAP API without authentication. Additionally, DNS rebinding techniques may be used to exploit this vulnerability remotely. Exploiting this vulnerability is somewhat involved. The following limitations apply to the payload and must be overcome for successful exploitation: - No more than 17 characters may be used. - At least one colon must be included to prevent mangling. - A single-quote and meta-character must be used to break out of the existing command. - Parent command remnants after the injection point must be dealt with. - The payload must be in all-caps. Despite these limitations, it is still possible to gain access to an interactive root shell via this vulnerability. Since the web server assigns certain HTTP headers to environment variables with all-caps names, it is possible to insert a payload into one such header and reference the subsequent environment variable in the injection point.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
NETGEAR Nighthawk X10-R9000 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
NETGEAR Nighthawk X10-R9000是美国网件(NETGEAR)公司的一款无线路由器。 使用1.0.4.26之前版本固件的NETGEAR Nighthawk X10-R9000中存在操作系统命令注入漏洞。该漏洞源于外部输入数据构造操作系统可执行命令过程中,网络系统或产品未正确过滤其中的特殊字符、命令等。攻击者可利用该漏洞执行非法操作系统命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2019-12511

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-12511

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-02-24 · 33 CVEs total

CVE-2020-9366GNU Screen 缓冲区错误漏洞
CVE-2019-15299Centreon Web 授权问题漏洞
CVE-2019-20044Zsh 安全漏洞
CVE-2015-9542pam_radius 缓冲区错误漏洞
CVE-2020-5188DNN 代码问题漏洞
CVE-2020-5187DNN 路径遍历漏洞
CVE-2020-5186DNN 跨站脚本漏洞
CVE-2019-20481MIELE XGW 3000 ZigBee Gateway 授权问题漏洞
CVE-2019-20480MIELE XGW 3000 ZigBee Gateway 安全漏洞
CVE-2019-18183pacman 操作系统命令注入漏洞
CVE-2019-18182pacman 操作系统命令注入漏洞
CVE-2020-8131Yarn 路径遍历漏洞
CVE-2020-8130Ruby Rake 操作系统命令注入漏洞
CVE-2020-9363Sophos Intercept X Endpoint 输入验证错误漏洞
CVE-2020-9362Quick Heal 输入验证错误漏洞
CVE-2020-9365Pure-FTPd 缓冲区错误漏洞
CVE-2020-9385Zint libzint 代码问题漏洞
CVE-2016-11020Kunena 代码问题漏洞
CVE-2020-9369Sympa 资源管理错误漏洞
CVE-2019-10798rdf-graph-array 资源管理错误漏洞

Showing top 20 of 33 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-12511

No comments yet


Leave a comment