CVE-2017-18368
The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- May 02, 2019
- Published Date
- May 02, 2019
- Last Updated
- February 04, 2025
- Vendor
- n/a
- Product
- n/a
- Description
- The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter.
CVSS Scores
CVSS v3.1
9.8 - CRITICAL
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
SSVC Information
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
Exploit Status
- Exploited in the Wild
- Yes (added 2023-08-07 00:00:00 UTC) Source
References
https://seclists.org/fulldisclosure/2017/Jan/40
https://ssd-disclosure.com/index.php/archives/2910
https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/
https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt
http://www.zyxel.com/support/announcement_unauthenticated.shtml
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2023-08-07 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/trueonline_p660hn_v1_rce.rb | 2025-04-29 11:01:15 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
trueonline_p660hn_v1_rce
Type: metasploit • Created: Unknown
Metasploit module for CVE-2017-18368