CVE-2019-7385
HIGHRaisecom ISCOM HT803G-U/-W/-1GE/GPON <2.0.0_140521_R4.1.47.002 - Co...
Title source: llmDescription
An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or below, The values of the newpass and confpass parameters in /bin/WebMGR are used in a system call in the firmware. Because there is no user input validation, this leads to authenticated code execution on the device.
Exploits (1)
exploitdb
WORKING POC
by JameelNabbo · textwebappshardware
https://www.exploit-db.com/exploits/46489
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/107030
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/151650/Raisecom-Technology-GPON-ONU-HT803G-07-Command-Injection.html
Exploit, Mailing List, Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2019/Feb/34
Third Party Advisory x_refsource_misc
http://breakthesec.com
Exploit, Third Party Advisory x_refsource_misc
http://www.breakthesec.com/search/label/0day
Third Party Advisory x_refsource_misc
https://s3curityb3ast.github.io
Third Party Advisory x_refsource_misc
https://s3curityb3ast.github.io/KSA-Dev-006.md
Scores
CVSS v3
7.8
EPSS
0.0475
EPSS Percentile
89.5%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (4)
raisecom/iscom_ht803g-1ge_firmware
< iscomht803g-u_2.0.0_140521_r4.1.47.002
raisecom/iscom_ht803g-u_firmware
< iscomht803g-u_2.0.0_140521_r4.1.47.002
raisecom/iscom_ht803g-w_firmware
< iscomht803g-u_2.0.0_140521_r4.1.47.002
raisecom/iscom_ht803g_gpon_firmware
< iscomht803g-u_2.0.0_140521_r4.1.47.002
Published
Mar 21, 2019
Tracked Since
Feb 18, 2026