CVE-2017-18368
The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- May 02, 2019
- Published Date
- May 02, 2019
- Last Updated
- February 04, 2025
- Vendor
- ZyXEL
- Product
- P660HN-T1A v1 TCLinux Fw
- Description
- The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter.
- Tags
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
- Exploited in the Wild
- Yes (2025-05-05 00:00:00 UTC) Source
linux
cisa
edge
metasploit_scanner
CVSS Scores
CVSS v3.1
9.8 - CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0
10.0
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
SSVC Information
Exploit Status
References
https://seclists.org/fulldisclosure/2017/Jan/40
https://ssd-disclosure.com/index.php/archives/2910
https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/
https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt
http://www.zyxel.com/support/announcement_unauthenticated.shtml
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2023-08-07 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/trueonline_p660hn_v1_rce.rb | 2025-04-29 11:01:15 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
trueonline_p660hn_v1_rce
Type: metasploit • Created: Unknown
Metasploit module for CVE-2017-18368
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Added to KEVIntel
-
Detected by Metasploit