Geutebruck instantrec Remote Command Execution

Discussion in 'News Aggregator' started by Packet Storm, 18 Sep 2021.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits a buffer overflow within the 'action' parameter of the /uapi-cgi/instantrec.cgi page of Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx, ETHC-22xx, and EWPC-22xx devices running firmware versions equal to 1.12.0.27 as well as firmware versions 1.12.13.2 and 1.12.14.5. Successful exploitation results in remote code execution as the root user.

    Continue reading...
     

Share This Page

Loading...