CVE-2019-7385

HIGH

Raisecom ISCOM HT803G-U/-W/-1GE/GPON <2.0.0_140521_R4.1.47.002 - Co...

Title source: llm
STIX 2.1

Description

An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or below, The values of the newpass and confpass parameters in /bin/WebMGR are used in a system call in the firmware. Because there is no user input validation, this leads to authenticated code execution on the device.

Exploits (1)

exploitdb WORKING POC
by JameelNabbo · textwebappshardware
https://www.exploit-db.com/exploits/46489

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/107030
Exploit, Mailing List, Third Party Advisory mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2019/Feb/34
Third Party Advisory x_refsource_misc
http://breakthesec.com
Exploit, Third Party Advisory x_refsource_misc
http://www.breakthesec.com/search/label/0day
Third Party Advisory x_refsource_misc
https://s3curityb3ast.github.io
Third Party Advisory x_refsource_misc
https://s3curityb3ast.github.io/KSA-Dev-006.md

Scores

CVSS v3 7.8
EPSS 0.0475
EPSS Percentile 89.5%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (4)
raisecom/iscom_ht803g-1ge_firmware < iscomht803g-u_2.0.0_140521_r4.1.47.002
raisecom/iscom_ht803g-u_firmware < iscomht803g-u_2.0.0_140521_r4.1.47.002
raisecom/iscom_ht803g-w_firmware < iscomht803g-u_2.0.0_140521_r4.1.47.002
raisecom/iscom_ht803g_gpon_firmware < iscomht803g-u_2.0.0_140521_r4.1.47.002
Published Mar 21, 2019
Tracked Since Feb 18, 2026