Vulnerability Description
On Mitel 6869i 4.5.0.41 devices, the Manual Firmware Update (upgrade.html) page does not perform sanitization on the username and path parameters (sent by an authenticated user) before appending flags to the busybox ftpget command. This leads to $() command execution.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mitel | 6869I Sip Firmware | 4.5.0.41 |
| Mitel | 6869I Sip | - |
Related Weaknesses (CWE)
References
- https://github.com/kwburns/CVE/blob/main/Mitel/5.0.0.1018/code/exploit-firmware.Product
- https://github.com/kwburns/CVE/tree/main/Mitel/5.0.0.1018#authenticated-remote-cExploitThird Party Advisory
- https://github.com/kwburns/CVE/blob/main/Mitel/5.0.0.1018/code/exploit-firmware.Product
- https://github.com/kwburns/CVE/tree/main/Mitel/5.0.0.1018#authenticated-remote-cExploitThird Party Advisory
FAQ
What is CVE-2024-37570?
CVE-2024-37570 is a vulnerability with a CVSS score of 8.8 (HIGH). On Mitel 6869i 4.5.0.41 devices, the Manual Firmware Update (upgrade.html) page does not perform sanitization on the username and path parameters (sent by an authenticated user) before appending flags...
How severe is CVE-2024-37570?
CVE-2024-37570 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-37570?
Check the references section above for vendor advisories and patch information. Affected products include: Mitel 6869I Sip Firmware, Mitel 6869I Sip.