CVE-2023-38120

HIGH

Adtran Sr400ac Firmware - Command Injection

Title source: rule
STIX 2.1

Description

Adtran SR400ac ping Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adtran SR400ac routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ping command, which is available over JSON-RPC. A crafted host parameter can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-20525.

Exploits (1)

nomisec WORKING POC 2 stars
by warber0x · poc
https://github.com/warber0x/CVE-2023-38120

References (1)

Core 1
Core References
Third Party Advisory x_research-advisory
https://www.zerodayinitiative.com/advisories/ZDI-23-1010/

Scores

CVSS v3 8.8
EPSS 0.0211
EPSS Percentile 84.3%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-78 CWE-77
Status published
Products (2)
adtran/sr400ac_firmware 10.8.5.1
adtran/sr400ac_firmware 10.8.8.1
Published May 03, 2024
Tracked Since Feb 18, 2026