Vulnerability Description
An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or below, The values of the newpass and confpass parameters in /bin/WebMGR are used in a system call in the firmware. Because there is no user input validation, this leads to authenticated code execution on the device.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Raisecom | Iscom Ht803G-U Firmware | <= iscomht803g-u_2.0.0_140521_r4.1.47.002 |
| Raisecom | Iscom Ht803G-U | - |
| Raisecom | Iscom Ht803G-W Firmware | < iscomht803g-u_2.0.0_140521_r4.1.47.002 |
| Raisecom | Iscom Ht803G-W | - |
| Raisecom | Iscom Ht803G-1Ge Firmware | < iscomht803g-u_2.0.0_140521_r4.1.47.002 |
| Raisecom | Iscom Ht803G-1Ge | - |
| Raisecom | Iscom Ht803G Gpon Firmware | < iscomht803g-u_2.0.0_140521_r4.1.47.002 |
| Raisecom | Iscom Ht803G Gpon | - |
Related Weaknesses (CWE)
References
- http://breakthesec.comThird Party Advisory
- http://packetstormsecurity.com/files/151650/Raisecom-Technology-GPON-ONU-HT803G-ExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Feb/34ExploitMailing ListThird Party Advisory
- http://www.breakthesec.com/search/label/0dayExploitThird Party Advisory
- http://www.securityfocus.com/bid/107030Third Party AdvisoryVDB Entry
- https://s3curityb3ast.github.ioThird Party Advisory
- https://s3curityb3ast.github.io/KSA-Dev-006.mdThird Party Advisory
- http://breakthesec.comThird Party Advisory
- http://packetstormsecurity.com/files/151650/Raisecom-Technology-GPON-ONU-HT803G-ExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Feb/34ExploitMailing ListThird Party Advisory
- http://www.breakthesec.com/search/label/0dayExploitThird Party Advisory
- http://www.securityfocus.com/bid/107030Third Party AdvisoryVDB Entry
- https://s3curityb3ast.github.ioThird Party Advisory
- https://s3curityb3ast.github.io/KSA-Dev-006.mdThird Party Advisory
FAQ
What is CVE-2019-7385?
CVE-2019-7385 is a vulnerability with a CVSS score of 7.8 (HIGH). An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1....
How severe is CVE-2019-7385?
CVE-2019-7385 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-7385?
Check the references section above for vendor advisories and patch information. Affected products include: Raisecom Iscom Ht803G-U Firmware, Raisecom Iscom Ht803G-U, Raisecom Iscom Ht803G-W Firmware, Raisecom Iscom Ht803G-W, Raisecom Iscom Ht803G-1Ge Firmware.