First published: Sun Mar 17 2019(Updated: )
An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or below, The values of the newpass and confpass parameters in /bin/WebMGR are used in a system call in the firmware. Because there is no user input validation, this leads to authenticated code execution on the device.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Raisecom Iscom Ht803g-u Firmware | <=iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom ISCOM HT803G-U | ||
Raisecom Iscom Ht803g-w Firmware | <iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom Iscom Ht803g-w | ||
Raisecom Iscom Ht803g-1ge Firmware | <iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom Iscom Ht803g-1ge | ||
Raisecom Iscom Ht803g Gpon Firmware | <iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom Iscom Ht803g Gpon | ||
All of | ||
Raisecom Iscom Ht803g-u Firmware | <=iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom ISCOM HT803G-U | ||
All of | ||
Raisecom Iscom Ht803g-w Firmware | <iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom Iscom Ht803g-w | ||
All of | ||
Raisecom Iscom Ht803g-1ge Firmware | <iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom Iscom Ht803g-1ge | ||
All of | ||
Raisecom Iscom Ht803g Gpon Firmware | <iscomht803g-u_2.0.0_140521_r4.1.47.002 | |
Raisecom Iscom Ht803g Gpon |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7385 has a high severity due to its potential for authenticated shell command injection.
To fix CVE-2019-7385, update the firmware of Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products to a version above ISCOMHT803G-U_2.0.0_140521_R4.1.47.002.
CVE-2019-7385 affects the Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products running specific firmware versions.
CVE-2019-7385 is caused by improper handling of the newpass and confpass parameters in the web management interface.
There are no specific workarounds for CVE-2019-7385; updating the firmware is the recommended approach.