Vulnerability Description
Inteno iopsys 2.0-3.14 and 4.0 devices allow remote authenticated users to execute arbitrary OS commands by modifying the leasetrigger field in the odhcpd configuration to specify an arbitrary program, as demonstrated by a program located on an SMB share. This issue existed because the /etc/uci-defaults directory was not being used to secure the OpenWrt configuration.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intenogroup | Iopsys | >= 2.0, <= 3.14 |
Related Weaknesses (CWE)
References
- http://public.inteno.se/?p=feed-inteno-openwrt.git%3Ba=commit%3Bh=efcc985a721107
- https://neonsea.uk/blog/2017/12/23/rce-inteno-iopsys.htmlExploitTechnical DescriptionThird Party Advisory
- https://www.exploit-db.com/exploits/43428/ExploitThird Party AdvisoryVDB Entry
- http://public.inteno.se/?p=feed-inteno-openwrt.git%3Ba=commit%3Bh=efcc985a721107
- https://neonsea.uk/blog/2017/12/23/rce-inteno-iopsys.htmlExploitTechnical DescriptionThird Party Advisory
- https://www.exploit-db.com/exploits/43428/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2017-17867?
CVE-2017-17867 is a vulnerability with a CVSS score of 8.8 (HIGH). Inteno iopsys 2.0-3.14 and 4.0 devices allow remote authenticated users to execute arbitrary OS commands by modifying the leasetrigger field in the odhcpd configuration to specify an arbitrary program...
How severe is CVE-2017-17867?
CVE-2017-17867 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-17867?
Check the references section above for vendor advisories and patch information. Affected products include: Intenogroup Iopsys.