725
VMScore

CVE-2018-14533

Published: 31/07/2018 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

read_tmp and write_tmp in Inteno IOPSYS allow malicious users to gain privileges after writing to /tmp/etc/smb.conf because /var is a symlink to /tmp.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intenogroup iopsys_firmware -

Exploits

#!/usr/bin/python import json import sys import subprocess import socket import os from websocket import create_connection def ubusAuth(host, username, password): ws = create_connection("ws://" + host, header = ["Sec-WebSocket-Protocol: ubus-json"]) req = jsondumps({"jsonrpc":"20","method":"call", "params":["00000000000000000000 ...

Github Repositories

A collection of exploits for various vulnerabilities targeting Inteno IOPSYS devices

Proof of concepts and exploits for IOPSYS devices This is a collection of scripts which abuse various vulnerabilities on devices running Inteno's IOPSYS More details about each vulnerability can be found on my blog These scripts have only been tested on Linux, but they may also work on other operating systems Dependencies The Python scripts require Python 36+ and the