9.8
CVSSv3

CVE-2016-5640

Published: 03/08/2016 Updated: 15/08/2016
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 891
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Directory traversal vulnerability in cgi-bin/rftest.cgi on Crestron AirMedia AM-100 devices with firmware prior to 1.4.0.13 allows remote malicious users to execute arbitrary commands via a .. (dot dot) in the ATE_COMMAND parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

crestron airmedia_am-100_firmware

Github Repositories

CrestCrack CrestCrack is a simple script that exploits CVE-2016-5640 / CLVA-2016-05-002 within the Crestron AirMedia AM-100 (v11111 - v121) When supplied with arguments CrestCrack will utilize netcat to create a reverse shell between your target and a netcat listener of your choice Setup: Clone a copy of CrestCrack git clone githubcom/vpnguy/CrestCrack 2 Launc

Crestron AirMedia AM-100 RCE (CVE-2016-5640) Metasploit Module

CVE-2016-5640 Crestron AirMedia AM-100 RCE (CVE-2016-5640) Metasploit Module Module for exploiting a Remote Command Injection vulnerability in the wireless diagnostics page for Crestron AirMedia AM-100 devices with a firmware version <14013 Commands execute as the account running the service (ie usually root) An older exploit I worte a module for because I wanted

Exploits CVE-2016-5640 / CLVA-2016-05-002 against Crestron AM-100

CrestCrack CrestCrack is a simple script that exploits CVE-2016-5640 / CLVA-2016-05-002 within the Crestron AirMedia AM-100 (v11111 - v121) When supplied with arguments CrestCrack will utilize netcat to create a reverse shell between your target and a netcat listener of your choice Setup: Clone a copy of CrestCrack git clone githubcom/vpnguy/CrestCrack Launch a