### [CVE-2018-20487](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20487) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in the firewall3 component in Inteno IOPSYS 1.0 through 3.16. The attacker must make a JSON-RPC method call to add a firewall rule as an "include" and point the "path" argument to a malicious script or binary. This gets executed as root when the firewall changes are committed. ### POC #### Reference - https://neonsea.uk/blog/2018/12/26/firewall-includes.html - https://neonsea.uk/blog/2018/12/26/firewall-includes.html #### Github No PoCs found on GitHub currently.