Vulnerabilites related to mc-technologies - mc_lr_router_firmware
cve-2024-21786
Vulnerability from cvelistv5
Published
2024-11-21 14:41
Modified
2024-11-22 14:25
Summary
An OS command injection vulnerability exists in the web interface configuration upload functionality of MC Technologies MC LR Router 2.10.5. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Impacted products
Vendor Product Version
MC Technologies MC LR Router Version: 2.10.5 (QEMU)
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-11-21T16:03:28.848Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  url: "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1954",
               },
            ],
            title: "CVE Program Container",
         },
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:mc_technologies:mc_lr_router:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "mc_lr_router",
                  vendor: "mc_technologies",
                  versions: [
                     {
                        status: "affected",
                        version: "2.10.5qemu",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-21786",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-22T14:24:32.247494Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-22T14:25:07.195Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "MC LR Router",
               vendor: "MC Technologies",
               versions: [
                  {
                     status: "affected",
                     version: "2.10.5 (QEMU)",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Discovered by Matt Wiseman of Cisco Talos.",
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "An OS command injection vulnerability exists in the web interface configuration upload functionality of MC Technologies MC LR Router 2.10.5. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-78",
                     description: "CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-11-21T14:41:19.212Z",
            orgId: "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
            shortName: "talos",
         },
         references: [
            {
               name: "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1954",
               url: "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1954",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
      assignerShortName: "talos",
      cveId: "CVE-2024-21786",
      datePublished: "2024-11-21T14:41:19.212Z",
      dateReserved: "2024-02-29T21:52:48.326Z",
      dateUpdated: "2024-11-22T14:25:07.195Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2024-11-21 15:15
Modified
2024-12-18 15:06
Summary
An OS command injection vulnerability exists in the web interface configuration upload functionality of MC Technologies MC LR Router 2.10.5. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:mc-technologies:mc_lr_router_firmware:2.10.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "95D3D1A7-DA67-4319-B836-010FCBE4B63C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:mc-technologies:mc_lr_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "330D7083-CDC2-4532-8F13-109C8272F5BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "An OS command injection vulnerability exists in the web interface configuration upload functionality of MC Technologies MC LR Router 2.10.5. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.",
      },
      {
         lang: "es",
         value: "Existe una vulnerabilidad de inyección de comandos del sistema operativo en la funcionalidad de carga de configuración de la interfaz web de MC Technologies MC LR Router 2.10.5. Una solicitud HTTP especialmente manipulada puede provocar la ejecución de un comando arbitrario. Un atacante puede realizar una solicitud HTTP autenticada para activar esta vulnerabilidad.",
      },
   ],
   id: "CVE-2024-21786",
   lastModified: "2024-12-18T15:06:28.230",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 5.9,
            source: "talos-cna@cisco.com",
            type: "Primary",
         },
      ],
   },
   published: "2024-11-21T15:15:26.580",
   references: [
      {
         source: "talos-cna@cisco.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1954",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
         ],
         url: "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1954",
      },
   ],
   sourceIdentifier: "talos-cna@cisco.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-78",
            },
         ],
         source: "talos-cna@cisco.com",
         type: "Primary",
      },
   ],
}