Headline
CVE-2023-41029: Juplink RX4-1500 Command Injection Vulnerability - Exodus Intelligence
Command injection vulnerability in the homemng.htm endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows authenticated remote attackers to execute commands as root via specially crafted HTTP requests to the vulnerable endpoint.
- September 18, 2023
- Advisories
EIP-9f56ea7e
A command injection exists in Juplink RX4-1500, a WiFi router. An authenticated attacker can exploit this vulnerability to achieve code execution as root.
Vulnerability Identifiers
- Exodus Intelligence: EIP-9f56ea7e
- MITRE: CVE-2023-41029
Vulnerability Metrics
- CVSSv2 Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C
- CVSSv2 Score: 7.7
Vendor References
- The affected product is end-of-life and no patches are available.
Discovery Credit
- Exodus Intelligence
Disclosure Timeline
- Vendor response to disclosure: July 30, 2020
- Disclosed to public: September 18, 2023
Further Information
Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected].