The exploit demonstrates an unauthenticated remote command execution vulnerability in Iris ID IrisAccess ICU 7000-2 due to unsanitized POST parameters in '/html/SetSmarcardSettings.php' being passed to the exec() PHP function. The provided curl command shows command injection via the 'cmbBook' parameter, resulting in arbitrary command execution as root.
Classification
Working Poc 95%
Target:
Iris ID IrisAccess ICU 7000-2 (ICU Software: 1.00.08, ICU OS: 1.3.8)
No auth needed
Prerequisites:
Network access to the target device · The '/html/SetSmarcardSettings.php' endpoint must be accessible