Vulnerability Description
Three OS command injection vulnerabilities exist in the web interface I/O configuration functionality of MC Technologies MC LR Router 2.10.5. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability refers to the authetnicated OS Command injection that occurs through the attacker-controlled `timer1` parameter, at offset `0x8e80`.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mc-Technologies | Mc Lr Router Firmware | 2.10.5 |
| Mc-Technologies | Mc Lr Router | - |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2024-1953ExploitThird Party Advisory
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1953
FAQ
What is CVE-2024-28027?
CVE-2024-28027 is a vulnerability with a CVSS score of 7.2 (HIGH). Three OS command injection vulnerabilities exist in the web interface I/O configuration functionality of MC Technologies MC LR Router 2.10.5. A specially crafted HTTP request can lead to arbitrary com...
How severe is CVE-2024-28027?
CVE-2024-28027 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-28027?
Check the references section above for vendor advisories and patch information. Affected products include: Mc-Technologies Mc Lr Router Firmware, Mc-Technologies Mc Lr Router.