First published: Thu Apr 23 2020(Updated: )
Juplink RX4-1500 v1.0.3 allows remote attackers to gain root access to the Linux subsystem via an unsanitized exec call (aka Command Line Injection), if the undocumented telnetd service is enabled and the attacker can authenticate as admin from the local network.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Juplink RX4-1500 Firmware | =1.0.3 | |
Juplink RX4-1500 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-8797 is medium with a score of 6.7.
Remote attackers can gain root access to the Linux subsystem by exploiting an unsanitized exec call (aka Command Line Injection) if the undocumented telnetd service is enabled and the attacker can authenticate as admin from the local network.
The affected software of CVE-2020-8797 is Juplink RX4-1500 v1.0.3.
To fix CVE-2020-8797, it is recommended to update the Juplink RX4-1500 firmware to a version that addresses the vulnerability.
The CWE of CVE-2020-8797 is CWE-78 (Improper Neutralization of Special Elements used in an OS Command).