CVE-2018-4063 – Sierra Wireless AirLink ES450 ACEManager upload.cgi Remote Code Execution
https://notcve.org/view.php?id=CVE-2018-4063
An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. Existe una vulnerabilidad explotable de ejecución remota de código en la funcionalidad upload.cgi de Sierra Wireless AirLink ES450 FW 4.9.3. Una petición HTTP especialmente diseñada puede permitir cargar un archivo, que daría como resultado que el código ejecutable se cargue y se pueda enrutar en el servidor web. • http://packetstormsecurity.com/files/152648/Sierra-Wireless-AirLink-ES450-ACEManager-upload.cgi-Remote-Code-Execution.html http://www.securityfocus.com/bid/108147 https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03 https://talosintelligence.com/vulnerability_reports/TALOS-2018-0748 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2018-4064 – Sierra Wireless AirLink ES450 ACEManager upload.cgi Unverified Password Change
https://notcve.org/view.php?id=CVE-2018-4064
An exploitable unverified password change vulnerability exists in the ACEManager upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause a unverified device configuration change, resulting in an unverified change of the user password on the device. An attacker can make an authenticated HTTP request to trigger this vulnerability. Se presenta una vulnerabilidad de cambio de contraseña no comprobado explotable en la funcionalidad ACEManager upload.cgi de Sierra Wireless AirLink ES450 FW versión 4.9.3. Una petición HTTP especialmente diseñada puede causar un cambio no comprobado en la configuración del dispositivo, resultando en un cambio no comprobado de la contraseña del usuario en el dispositivo. • https://talosintelligence.com/vulnerability_reports/TALOS-2018-0749 • CWE-287: Improper Authentication •
CVE-2018-4061 – Sierra Wireless AirLink ES450 ACEManager iplogging.cgi Command Injection
https://notcve.org/view.php?id=CVE-2018-4061
An exploitable command injection vulnerability exists in the ACEManager iplogging.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can inject arbitrary commands, resulting in arbitrary command execution. An attacker can send an authenticated HTTP request to trigger this vulnerability. Existe una vulnerabilidad de inyección de comandos explotable en la funcionalidad iplogging.cgi de ACEManager de Sierra Wireless AirLink ES450 FW 4.9.3. Una petición HTTP especialmente diseñada puede inyectar comandos arbitrarios, lo que resulta en una ejecución arbitraria de los mismos. • http://packetstormsecurity.com/files/152646/Sierra-Wireless-AirLink-ES450-ACEManager-iplogging.cgi-Command-Injection.html http://www.securityfocus.com/bid/108147 https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03 https://talosintelligence.com/vulnerability_reports/TALOS-2018-0746 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •