Geutebruck Remote Command Execution

Discussion in 'News Aggregator' started by Packet Storm, 3 Sep 2021.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module bypasses the HTTP basic authentication used to access the /uapi-cgi/ folder and exploits multiple authenticated arbitrary command execution vulnerabilities within the parameters of various pages on Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx, ETHC-22xx, and EWPC-22xx devices running firmware versions 1.12.0.27 and below as well as firmware versions 1.12.13.2 and 1.12.14.5. Successful exploitation results in remote code execution as the root user.

    Continue reading...
     

Share This Page

Loading...