关键信息 Title: Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway Remote Root Exploit Advisory ID: ZSL-2018-5479 Type: Local/Remote Impact: System Access Risk: 5/5 Release Date: 17.07.2018 Vendor Microhard Systems Inc. - http://www.microhardcorp.com Affected Version IPn4G 1.1.0 build 1098 IPn3Gb 2.2.0 build 2160 IPn4Gb 1.1.6 build 1184-14 IPn4Gb 1.1.0 Rev 2 build 1090-2 IPn4Gb 1.1.0 Rev 2 build 1086 Bullet-3G-1.2.0 Rev A build 1032 VIP4G b 1.1.6 build 1204 VIP4G b 1.1.6 Rev 3.0 build 1184-14 VIP4G-WiFi-N 1.1.6 Rev 2.0.0 build 1196 IPn4GiJ / Bullet-3G 1.2.0 build 1076 IPn4Ghi / Bullet-LTE 1.2.0 build 1078 BulletPlus 1.3.0 build 1036 Dragon-LTE 1.1.0 build 1036 Tested On httpd-ssl-1.0.0 Linux 2.6.32.9 (Bin@DProBuilder) (gcc version 4.4.3) Vendor Status 13.03.2018: Vulnerability discovered. 13.03.2018: Vendor contacted. 09.05.2018: No response from the vendor. 10.05.2018: Vendor contacted again. 24.05.2018: No response from the vendor. 25.05.2018: Vendor contacted again. 16.07.2018: No response from the vendor. 17.07.2018: Public security advisory released. PoC microhard_rce.txt Credits Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>