漏洞关键信息 EDB-ID: 45035 CVE: N/A Author: LIQUIDWORM Type: DOS Platform: HARDWARE Date: 2018-07-17 Vulnerable App: IPn4G, IPn3Gb, IPn4Gb, IPn4Gb Rev 2, Bullet-3G Rev A, VIP4Gb, VIP4G Rev 3.0 漏洞描述 Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Service Control DoS 漏洞细节 Vendor: Microhard Systems Inc. Product web page: http://www.microhardcorp.com Affected versions: - IPn4G 1.1.0 build 1098 - IPn3Gb 2.2.0 build 2160 - IPn4Gb 1.1.6 build 1184-14 - IPn4Gb 1.1.0 Rev 2 build 1090-2 - IPn4Gb 1.1.0 Rev 2 build 1086 - Bullet-3G 1.2.0 Rev A build 1032 - VIP4Gb 1.1.6 build 1204 - VIP4G 1.1.6 Rev 3.0 build 1184-14 漏洞描述 存在一个未记录和隐藏的功能,允许经过身份验证的攻击者列出操作系统中正在运行的进程,并发送任意信号以终止后台运行的任何进程,包括启动和停止系统服务。这影响可用性,并且可以通过需要设备重新启动和/或工厂重置的CSRF攻击触发,以回滚恶意更改。 测试环境 Tested on: httpd-ssl-1.0.0 Linux version: 2.6.32.9 (Bin@DProBuilder) (gcc version 4.4.3) 发现者 Vulnerability discovered by: Gjoko 'LiquidWorm' Krstic @zeroscience 咨询信息 Advisory ID: ZSL-2018-5481 Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2018-5481.php 漏洞利用示例 标签 Tags: Denial of Service (DoS)