The web console for Mimosa B5, B5c, and C5x firmware through 2.8.0.2 allows authenticated command injection in the Throughput, WANStats, PhyStats, and QosStats API classes. An attacker with access to a web console account may execute operating system commands on affected devices by sending crafted POST requests to the affected endpoints (/core/api/calls/Throughput.php, /core/api/calls/WANStats.php, /core/api/calls/PhyStats.php, /core/api/calls/QosStats.php). This results in the complete takeover of the vulnerable device. This vulnerability does not occur in the older 1.5.x firmware versions.
References
Link | Resource |
---|---|
https://cwe.mitre.org/data/definitions/78.html | Third Party Advisory |
https://labs.f-secure.com/advisories/ | Third Party Advisory |
https://labs.f-secure.com/advisories/mimosa-ptp-devices-multiple-vulnerabilities/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2021-07-20 19:15
Updated : 2022-10-05 16:21
NVD link : CVE-2020-25206
Mitre link : CVE-2020-25206
CVE.ORG link : CVE-2020-25206
JSON object : View
Products Affected
mimosa
- b5c_firmware
- c5c_firmware
- b5_firmware
- b5c
- b5
- c5c
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')