2024-12-08 03:06:42 +00:00

124 lines
4.3 KiB
JSON

{
"id": "CVE-2018-10987",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-07-05T20:29:00.323",
"lastModified": "2024-11-21T03:42:26.587",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Dongguan Diqee Diqee360 devices. The affected vacuum cleaner suffers from an authenticated remote code execution vulnerability. An authenticated attacker can send a specially crafted UDP packet, and execute commands on the vacuum cleaner as root. The bug is in the function REQUEST_SET_WIFIPASSWD (UDP command 153). A crafted UDP packet runs \"/mnt/skyeye/mode_switch.sh %s\" with an attacker controlling the %s variable. In some cases, authentication can be achieved with the default password of 888888 for the admin account."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en dispositivos Dongguan Diqee Diqee360. La aspiradora afectada sufre de una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo autenticada. Un atacante autenticado puede enviar un paquete UDP especialmente manipulado y ejecutar comandos en la aspiradora como root. El error est\u00e1 en la funci\u00f3n REQUEST_SET_WIFIPASSWD (comando UDP 153). Un paquete UDP manipulado ejecuta \"/mnt/skyeye/mode_switch.sh %s\" mientras un atacante controla la variable %s. En algunas situaciones, la autenticaci\u00f3n puede lograrse mediante la contrase\u00f1a por defecto 888888 para la cuenta de administrador."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"baseScore": 8.5,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 6.8,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:diqee:diqee360_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF2397C7-AF72-4C9C-84D7-CD89F31B19B3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:diqee:diqee360:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A821DEA3-6C34-423D-9A38-80A6F4A68BF5"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/neolead/10b27c5c04bca84a5515783ca6f2ecb4#file-cve-2018-10987-txt",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/neolead/10b27c5c04bca84a5515783ca6f2ecb4#file-cve-2018-10987-txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}