9
CVSSv2

CVE-2017-17867

Published: 04/01/2018 Updated: 07/11/2023
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 905
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Inteno iopsys 2.0-3.14 and 4.0 devices allow remote authenticated users to execute arbitrary OS commands by modifying the leasetrigger field in the odhcpd configuration to specify an arbitrary program, as demonstrated by a program located on an SMB share. This issue existed because the /etc/uci-defaults directory was not being used to secure the OpenWrt configuration.

Vulnerable Product Search on Vulmon Subscribe to Product

intenogroup iopsys

intenogroup iopsys 4.0

Exploits

Inteno IOPSYS version 3164 suffers from a newline injection issue with samba share options that allows an attacker root access to the filesystem ...
#!/usr/bin/python import json import sys import subprocess import socket import os from time import sleep from websocket import create_connection def ubusAuth(host, username, password): ws = create_connection("ws://" + host, header = ["Sec-WebSocket-Protocol: ubus-json"]) req = jsondumps({"jsonrpc":"20","method":"call", "params" ...

Github Repositories

A collection of exploits for various vulnerabilities targeting Inteno IOPSYS devices

Proof of concepts and exploits for IOPSYS devices This is a collection of scripts which abuse various vulnerabilities on devices running Inteno's IOPSYS More details about each vulnerability can be found on my blog These scripts have only been tested on Linux, but they may also work on other operating systems Dependencies The Python scripts require Python 36+ and the