Advertisement






Siklu EtherHaul Remote Command Execution

CVE Category Price Severity
CVE-XXXX-XXXX CWE-XXX Unknown High
Author Risk Exploitation Type Date
Unknown High Remote 2017-02-24
CPE
cpe:cpe:/h:siklu:etherhaul
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017020227

Below is a copy:

Siklu EtherHaul Remote Command Execution[+] Credits: Ian Ling
[+] Website: iancaling.com
[+] Source: http://blog.iancaling.com/post/155127766533

Vendor:
=================
https://www.siklu.com/

Product:
======================
-Siklu EtherHaul (EH-*)

Vulnerability Details:
=====================

Siklu EtherHaul devices are vulnerable to an unauthenticated remote command
execution (RCE) vulnerability. This vulnerability allows an attacker to
execute commands and retrieve information such as usernames and plaintext
passwords from the device with no authentication.

Affected versions:
<7.4.0

Impact:
The remote attacker has full admin access to the device.


Disclosure Timeline:
===================================
Vendor Notification: December 22, 2016
Initial Response: December 22, 2016
Patched by Vendor: February 13th, 2017
Public Disclosure: February 20th, 2017

Exploitation Technique:
=======================
Remote, no authentication required

Severity Level:
================
Critical




Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum