CVE-2019-14931

CRITICAL EXPLOITED IN THE WILD

Mitsubishielectric Smartrtu Firmware < 2.02 - OS Command Injection

Title source: rule

Description

An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote OS Command Injection vulnerability allows an attacker to execute arbitrary commands on the RTU due to the passing of unsafe user supplied data to the RTU's system shell. Functionality in mobile.php provides users with the ability to ping sites or IP addresses via Mobile Connection Test. When the Mobile Connection Test is submitted, action.php is called to execute the test. An attacker can use a shell command separator (;) in the host variable to execute operating system commands upon submitting the test data.

Exploits (1)

exploitdb WORKING POC
by xerubus · pythonwebappsphp
https://www.exploit-db.com/exploits/47235

Scores

CVSS v3 9.8
EPSS 0.6077
EPSS Percentile 98.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2019-12-13
InTheWild.io 2019-12-13
CWE
CWE-78
Status published
Products (2)
inea/me-rtu_firmware < 3.0
mitsubishielectric/smartrtu_firmware < 2.02
Published Oct 28, 2019
Tracked Since Feb 18, 2026