EIP-f4472693
A command injection vulnerability exists in the ‘SaveStaticRouteIPv4Params’ parameter of the Motorola MR2600. A remote attacker can exploit this vulnerability to achieve command execution. Authentication is required, however can be bypassed.
Vulnerability Identifier
- Exodus Intelligence: EIP-f4472693
- MITRE: CVE-2024-23627
Vulnerability Metrics
- CVSSv2 Vector: AV:A/AC:L/Au:S/C:C/I:C/A:C
- CVSSv2 Score: 7.7
Vendor References
- The affected product is end-of-life and no patches are available.
Discovery Credit
- Exodus Intelligence
Disclosure Timeline
- Disclosed to Vendor: April 29, 2021
- Disclosed to public: January 25, 2024
Further Information
Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected]
The post Motorola MR2600 ‘SaveStaticRouteIPv4Params’ Command Injection Vulnerability appeared first on Exodus Intelligence.
Related Posts
Softaculous Webuzo Password Reset Command Injection
Softaculous Webuzo FTP Management Command Injection
Softaculous Webuzo Authentication Bypass
Motorola MR2600 ‘SaveSysLogParams’ Command Injection Vulnerability
Motorola MR2600 ‘SaveStaticRouteIPv6Params’ Command Injection Vulnerability
Is Telegram really an encrypted messaging app?
DeepINTEL 2024 – a full Day all about Security Intelligence
D-Link DAP-1650 SUBSCRIBE ‘Callback’ Command Injection Vulnerability
D-Link DAP-1650 gena.cgi SUBSCRIBE Command Injection Vulnerability
A first look at Android 14 forensics
Windows Sockets: From Registered I/O to SYSTEM Privileges
When Speed Matters: Imaging Fast NVMe Drives
Top 5 Tech Trends at CES 2025
To Schnorr and beyond (part 2)
To Schnorr and beyond (Part 1)
Sysdiagnose in iOS 16: a first look from a Digital Forensics perspective
Some rough impressions of Worldcoin
Sideloading Low-Level Extraction Agent with Regular Apple IDs from Windows and Linux
Remarks on “Chat Control”
PRFs, PRPs and other fantastic things