ID

VAR-200903-0187


CVE

CVE-2008-6554


TITLE

Aztech ADSL2/2+ 4-port Router cgi-bin/script Vulnerable to arbitrary command execution

Trust: 0.8

sources: JVNDB: JVNDB-2009-002963

DESCRIPTION

cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote attackers to execute arbitrary commands via shell metacharacters in the query string. Aztech ADSL2/2+ 4 Port Router is prone to a remote command-injection vulnerability because it fails to adequately sanitize user-supplied input data. Aztech ADSL2/2+ 4 Port Router with firmware 3.7.0 is vulnerable; other versions may also be affected. Aztech ADSL2/2+ 4-port router is a small household ADSL broadband router product. ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Aztech ADSL2/2+ Shell Command Injection SECUNIA ADVISORY ID: SA29551 VERIFY ADVISORY: http://secunia.com/advisories/29551/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Aztech ADSL2/2+ 3.x http://secunia.com/product/18245/ DESCRIPTION: sipher has reported a vulnerability in Aztech ADSL2/2+, which can be exploited by malicious people to compromise a vulnerable system. Input passed via cgi-bin/script is not properly sanitised before being used. via specially crafted HTTP requests. SOLUTION: Filter malicious characters and character sequences using e.g. a web proxy. PROVIDED AND/OR DISCOVERED BY: sipher ORIGINAL ADVISORY: http://core.ifconfig.se/~core/?p=21 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2008-6554 // JVNDB: JVNDB-2009-002963 // BID: 28458 // VULHUB: VHN-36679 // PACKETSTORM: 65317

AFFECTED PRODUCTS

vendor:aztechmodel:adsl2\/2\+4-port routerscope:eqversion:3.7.0

Trust: 1.6

vendor:aztech groupmodel:adsl2/2+4-port routerscope:eqversion:3.7.0 build 070426

Trust: 0.8

vendor:aztechmodel:adsl2/2+ portscope:eqversion:43.7

Trust: 0.3

sources: BID: 28458 // JVNDB: JVNDB-2009-002963 // CNNVD: CNNVD-200903-512 // NVD: CVE-2008-6554

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-6554
value: HIGH

Trust: 1.0

NVD: CVE-2008-6554
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200903-512
value: CRITICAL

Trust: 0.6

VULHUB: VHN-36679
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-6554
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-36679
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-36679 // JVNDB: JVNDB-2009-002963 // CNNVD: CNNVD-200903-512 // NVD: CVE-2008-6554

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-36679 // JVNDB: JVNDB-2009-002963 // NVD: CVE-2008-6554

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200903-512

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-200903-512

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002963

PATCH

title:Top Pageurl:http://www.aztech.com/

Trust: 0.8

sources: JVNDB: JVNDB-2009-002963

EXTERNAL IDS

db:NVDid:CVE-2008-6554

Trust: 2.8

db:BIDid:28458

Trust: 2.0

db:SECUNIAid:29551

Trust: 1.8

db:OSVDBid:44267

Trust: 1.7

db:JVNDBid:JVNDB-2009-002963

Trust: 0.8

db:XFid:41492

Trust: 0.6

db:XFid:224

Trust: 0.6

db:BUGTRAQid:20080326 AZTECH ADSL2/2+ 4 PORT REMOTE ROOT

Trust: 0.6

db:CNNVDid:CNNVD-200903-512

Trust: 0.6

db:VULHUBid:VHN-36679

Trust: 0.1

db:PACKETSTORMid:65317

Trust: 0.1

sources: VULHUB: VHN-36679 // BID: 28458 // JVNDB: JVNDB-2009-002963 // PACKETSTORM: 65317 // CNNVD: CNNVD-200903-512 // NVD: CVE-2008-6554

REFERENCES

url:http://www.securityfocus.com/bid/28458

Trust: 1.7

url:http://osvdb.org/44267

Trust: 1.7

url:http://secunia.com/advisories/29551

Trust: 1.7

url:http://core.ifconfig.se/~core/?p=21

Trust: 1.2

url:http://www.securityfocus.com/archive/1/490100/100/0/threaded

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41492

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-6554

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-6554

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/41492

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/490100/100/0/threaded

Trust: 0.6

url:http://www.aztech.com

Trust: 0.3

url:/archive/1/490100

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/product/18245/

Trust: 0.1

url:http://secunia.com/advisories/29551/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

sources: VULHUB: VHN-36679 // BID: 28458 // JVNDB: JVNDB-2009-002963 // PACKETSTORM: 65317 // CNNVD: CNNVD-200903-512 // NVD: CVE-2008-6554

CREDITS

sipherr@gmail.com

Trust: 0.9

sources: BID: 28458 // CNNVD: CNNVD-200903-512

SOURCES

db:VULHUBid:VHN-36679
db:BIDid:28458
db:JVNDBid:JVNDB-2009-002963
db:PACKETSTORMid:65317
db:CNNVDid:CNNVD-200903-512
db:NVDid:CVE-2008-6554

LAST UPDATE DATE

2025-04-10T23:24:12.905000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-36679date:2018-10-11T00:00:00
db:BIDid:28458date:2015-05-07T17:31:00
db:JVNDBid:JVNDB-2009-002963date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200903-512date:2009-03-31T00:00:00
db:NVDid:CVE-2008-6554date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-36679date:2009-03-30T00:00:00
db:BIDid:28458date:2008-03-26T00:00:00
db:JVNDBid:JVNDB-2009-002963date:2012-06-26T00:00:00
db:PACKETSTORMid:65317date:2008-04-09T02:22:39
db:CNNVDid:CNNVD-200903-512date:2009-03-30T00:00:00
db:NVDid:CVE-2008-6554date:2009-03-30T20:30:00.843