First published: Sun Mar 17 2019(Updated: )
An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or below. The value of the fmgpon_loid parameter is used in a system call inside the boa binary. Because there is no user input validation, this leads to authenticated code execution on the device.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Raisecom Iscom Ht803g-u Firmware | <=iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom ISCOM HT803G-U | ||
Raisecom Iscom Ht803g-w Firmware | <iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom Iscom Ht803g-w | ||
Raisecom Iscom Ht803g-1ge Firmware | <iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom Iscom Ht803g-1ge | ||
Raisecom Iscom Ht803g Gpon Firmware | <iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom Iscom Ht803g Gpon | ||
All of | ||
Raisecom Iscom Ht803g-u Firmware | <=iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom ISCOM HT803G-U | ||
All of | ||
Raisecom Iscom Ht803g-w Firmware | <iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom Iscom Ht803g-w | ||
All of | ||
Raisecom Iscom Ht803g-1ge Firmware | <iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom Iscom Ht803g-1ge | ||
All of | ||
Raisecom Iscom Ht803g Gpon Firmware | <iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom Iscom Ht803g Gpon |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7384 is classified as a high severity vulnerability due to the potential for authenticated shell command injection.
To fix CVE-2019-7384, update the firmware of affected Raisecom ISCOM HT803G products to a version above ISCOMHT803G-U_2.0.0_140521_R4.1.47.002.
CVE-2019-7384 affects the Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products running vulnerable firmware.
CVE-2019-7384 is an authenticated shell command injection vulnerability that can be exploited through specific system calls.
CVE-2019-7384 requires authenticated access to the devices, making it less likely to be exploited remotely without credentials.