Vulnerability Description
An issue was discovered on Intex N150 devices. The backup/restore option does not check the file extension uploaded for importing a configuration files backup, which can lead to corrupting the router firmware settings or even the uploading of malicious files. In order to exploit the vulnerability, an attacker can upload any malicious file and force reboot the router with it.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intex | N150 Firmware | - |
| Intex | N150 | - |
Related Weaknesses (CWE)
References
- http://securitywarrior9.blogspot.com/2018/06/malicious-file-upload-intex-router-ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/44933/ExploitThird Party AdvisoryVDB Entry
- http://securitywarrior9.blogspot.com/2018/06/malicious-file-upload-intex-router-ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/44933/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2018-12528?
CVE-2018-12528 is a vulnerability with a CVSS score of 8.1 (HIGH). An issue was discovered on Intex N150 devices. The backup/restore option does not check the file extension uploaded for importing a configuration files backup, which can lead to corrupting the router ...
How severe is CVE-2018-12528?
CVE-2018-12528 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-12528?
Check the references section above for vendor advisories and patch information. Affected products include: Intex N150 Firmware, Intex N150.