物联网漏洞预警周报7.25~7.31

来源:银弹实验室 2022-08-02 14:53:47

声明

以下内容均摘自互联网,由于传播、利用此文所提供的信息而造成的任何直接或间接的后果和损失,均由使用者本人负责,银弹实验室以及文章作者不承担任何责任。

目录

1. Feixun  fir302b A2 路由器授权命令注入漏洞

2. Cisco Small Business路由器授权命令注入漏洞

3. Cisco Small Business路由器缓冲区溢出漏洞

漏洞详情

1. Feixun  fir302b A2 路由器授权命令注入漏洞

漏洞编号

CVE-2022-27373

漏洞介绍

上海斐讯数据通信技术有限公司路由器fir302b A2通过Ping功能被发现存在远程命令执行(RCE)漏洞。

Shanghai Feixun Data Communication Technology Co., Ltd router fir302b A2 was discovered to contain a remote command execution (RCE) vulnerability via the Ping function.

影响范围

  • Feixun fir302b A2

厂商修复状态

暂未修复

漏洞类型

命令注入漏洞

漏洞危害

授权攻击者可以远程执行任意命令

漏洞数据来源

MITRE

漏洞详情链接

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27373

CVE 编号分配日期

2022-03-21

漏洞发布日期

2022-07-19

漏洞信息更新日期

2022-07-28

2. Cisco Small Business路由器授权命令注入漏洞

漏洞编号

CVE-2022-20874

漏洞介绍

Cisco Small Business RV110W、RV130、RV130W 和 RV215W 路由器的基于 Web 的管理界面中存在多个漏洞,可能允许经过身份验证的远程攻击者在受影响的设备上执行任意代码或导致设备意外重启,从而导致拒绝服务 (DoS) 条件。这些漏洞是由于传入 HTTP 数据包中的用户字段验证不足所致。攻击者可以通过向基于 Web 的管理界面发送精心设计的请求来利用这些漏洞。成功的利用可能允许攻击者以根级别权限在受影响的设备上执行任意命令,或导致设备意外重启,从而导致 DoS 条件。要利用这些漏洞,攻击者需要在受影响的设备上拥有有效的管理员凭据。

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.

影响范围

  • Cisco RV110W 1.0.3.55

  • Cisco RV130 1.0.3.55

  • Cisco RV130W 1.0.3.55

  • Cisco RV215W 1.0.3.55

厂商修复状态

暂未修复

漏洞类型

命令注入漏洞

漏洞危害

授权攻击者可以远程执行任意shell命令

漏洞数据来源

Cisco Systems, Inc.

漏洞详情链接

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20874

CVE 编号分配日期

2021-11-02

漏洞发布日期

2022-07-21

漏洞信息更新日期

2022-07-26

3. Cisco Small Business路由器缓冲区溢出漏洞

漏洞编号

CVE-2022-20875

漏洞介绍

Cisco Small Business RV110W、RV130、RV130W 和 RV215W 路由器的基于 Web 的管理界面中存在多个漏洞,可能允许经过身份验证的远程攻击者在受影响的设备上执行任意代码或导致设备意外重启,从而导致拒绝服务 (DoS) 条件。这些漏洞是由于传入 HTTP 数据包中的用户字段验证不足所致。攻击者可以通过向基于 Web 的管理界面发送精心设计的请求来利用这些漏洞。成功的利用可能允许攻击者以根级别权限在受影响的设备上执行任意命令,或导致设备意外重启,从而导致 DoS 条件。要利用这些漏洞,攻击者需要在受影响的设备上拥有有效的管理员凭据。

Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device or cause the device to restart unexpectedly, resulting in a denial of service (DoS) condition. These vulnerabilities are due to insufficient validation of user fields within incoming HTTP packets. An attacker could exploit these vulnerabilities by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges or to cause the device to restart unexpectedly, resulting in a DoS condition. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.

影响范围

  • Cisco RV110W 1.0.3.55

  • Cisco RV130 1.0.3.55

  • Cisco RV130W 1.0.3.55

  • Cisco RV215W 1.0.3.55

厂商修复状态

暂未修复

漏洞类型

缓冲区溢出漏洞

漏洞危害

攻击者可以远程使设备拒绝服务,甚至执行任意命令

漏洞数据来源

Cisco Systems, Inc.

漏洞详情链接

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20875

CVE 编号分配日期

2021-11-02

漏洞发布日期

2022-07-21

漏洞信息更新日期

2022-07-26