10
CVSSv2

CVE-2019-14931

Published: 28/10/2019 Updated: 30/10/2019
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists on Mitsubishi Electric ME-RTU devices up to and including 2.02 and INEA ME-RTU devices up to and including 3.0. An unauthenticated remote OS Command Injection vulnerability allows an malicious user to execute arbitrary commands on the RTU due to the passing of unsafe user supplied data to the RTU's system shell. Functionality in mobile.php provides users with the ability to ping sites or IP addresses via Mobile Connection Test. When the Mobile Connection Test is submitted, action.php is called to execute the test. An attacker can use a shell command separator (;) in the host variable to execute operating system commands upon submitting the test data.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mitsubishielectric smartrtu_firmware

inea me-rtu_firmware

Vendor Advisories

Check Point Reference: CPAI-2019-3160 Date Published: 28 Feb 2024 Severity: Critical ...

Exploits

#!/usr/bin/python # Exploit Title: Mitsubishi Electric smartRTU & INEA ME-RTU Unauthenticated OS Command Injection # Date: 29 June 2019 # Exploit Author: (@xerubus | mogozobocom) # Vendor Homepage: eu3amitsubishielectriccom/fa/en/products/cnt/plcccl/items/smartRTU/local # Vendor Homepage: wwwineasi/en/telemetrija-in-m2m-pr ...