Vulnerability Description
Inteno routers have a JUCI ACL misconfiguration that allows the "user" account to read files, write to files, and add root SSH keys via JSON commands to ubus. (Exploitation is sometimes easy because the "user" password might be "user" or might match the Wi-Fi key.)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intenogroup | Inteno Router Firmware | - |
| Intenogroup | Inteno Router | - |
Related Weaknesses (CWE)
References
- https://neonsea.uk/blog/2017/07/17/cve-2017-11361.htmlExploitThird Party Advisory
- https://neonsea.uk/blog/2017/07/17/cve-2017-11361.htmlExploitThird Party Advisory
FAQ
What is CVE-2017-11361?
CVE-2017-11361 is a vulnerability with a CVSS score of 8.8 (HIGH). Inteno routers have a JUCI ACL misconfiguration that allows the "user" account to read files, write to files, and add root SSH keys via JSON commands to ubus. (Exploitation is sometimes easy because t...
How severe is CVE-2017-11361?
CVE-2017-11361 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-11361?
Check the references section above for vendor advisories and patch information. Affected products include: Intenogroup Inteno Router Firmware, Intenogroup Inteno Router.