Arbitrary Code Execution via Firewall Rule Inclusion in Inteno IOPSYS

Arbitrary Code Execution via Firewall Rule Inclusion in Inteno IOPSYS

CVE-2018-20487 · HIGH Severity

AV:N/AC:L/AU:S/C:C/I:C/A:C

An issue was discovered in the firewall3 component in Inteno IOPSYS 1.0 through 3.16. The attacker must make a JSON-RPC method call to add a firewall rule as an "include" and point the "path" argument to a malicious script or binary. This gets executed as root when the firewall changes are committed.

Learn more about our Web Application Penetration Testing UK.