First published: Tue Apr 04 2023(Updated: )
GreenPacket OH736's WR-1200 Indoor Unit, OT-235 with firmware versions M-IDU-1.6.0.3_V1.1 and MH-46360-2.0.3-R5-GP respectively are vulnerable to remote command injection. Commands are executed using pre-login execution and executed with root privileges allowing complete takeover.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Greenpacket WR-1200 | =m-idu-1.6.0.3_v1.1 | |
Greenpacket WR-1200 | ||
All of | ||
Any of | ||
Greenpacket OT-235 | =m-idu-1.6.0.3_v1.1 | |
Greenpacket OT-235 | =mh-46360-2.0.3-r5-gp | |
Greenpacket OT-235 | ||
Greenpacket WR-1200 | =m-idu-1.6.0.3_v1.1 | |
Greenpacket WR-1200 | ||
Greenpacket OT-235 | =m-idu-1.6.0.3_v1.1 | |
Greenpacket OT-235 | =mh-46360-2.0.3-r5-gp | |
Greenpacket OT-235 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26866 is considered a critical vulnerability due to its potential for remote command injection with root privileges.
To fix CVE-2023-26866, update the firmware of the GreenPacket WR-1200 Indoor Unit or OT-235 to the latest secure version.
CVE-2023-26866 affects the GreenPacket WR-1200 Indoor Unit and OT-235 with specific firmware versions M-IDU-1.6.0.3_V1.1 and MH-46360-2.0.3-R5-GP.
CVE-2023-26866 is a remote command injection vulnerability that allows attackers to execute commands pre-login.
Exploitation of CVE-2023-26866 can lead to a complete takeover of the affected device with root access.