Advertisement






Mitrastar GPT-2541GNAC-N1 Privilege Escalation

CVE Category Price Severity
CVE-2020-16503 CWE-269 $5,000 - $25,000 High
Author Risk Exploitation Type Date
An independent security researcher High Local 2021-09-29
CPE
cpe:cpe:/h:mitrastar:gpt_2541gnac_n1
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H 0.0063 0.4027

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2021090148

Below is a copy:

Mitrastar GPT-2541GNAC-N1 Privilege Escalation
# Exploit Title: Mitrastar GPT-2541GNAC-N1 - Privilege escalation
# Date: 10-08-2021
# Exploit Author: Leonardo Nicolas Servalli
# Vendor Homepage: www.mitrastar.com
# Platform: Mistrastar router devices GPT-2541GNAC-N1 (HGU)
# Tested on: Firmware BR_g3.5_100VNZ0b33
# Vulnerability analysis: https://github.com/leoservalli/Privilege-escalation-MitraStar/blob/main/README.md

Description:

----------

# Mitrastar GPT-2541GNAC-N1 devices are provided with access through ssh into a restricted default shell (credentials are on the back of the router and in some cases this routers use default credentials).

# The command deviceinfo show file <path> is used from reduced CLI to show files and directories. Because this command do not handle correctly special characters, is possible to insert a second command as a parameter on the <path> value. By using &&/bin/bash as parameter value we can spawn a bash console, as seen on the next example:


Exploit:
--------

> deviceinfo show file &&/bin/bash

# This command will spawn a full interoperable bash console with root privileges.

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum