Vulnerability Details : CVE-2018-16739
An issue was discovered on certain ABUS TVIP devices. Due to a path traversal in /opt/cgi/admin/filewrite, an attacker can write to files, and thus execute code arbitrarily with root privileges.
Vulnerability category: Directory traversalExecute code
Products affected by CVE-2018-16739
- cpe:2.3:o:abus:tvip_10000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_10001_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_10005_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_10005a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_10005b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_10050_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_10051_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_10055a_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_10055b_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_10500_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_10550_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_11000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_11050_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_11500_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_11501_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_11502_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_11550_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_11551_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_11552_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_20000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_20050_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_20500_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_20550_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_21000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_21050_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_21500_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_21501_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_21502_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_21550_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_21551_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_21552_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_22500_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_31000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_31001_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_31050_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_31500_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_31501_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_31550_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_31551_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_32500_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_51500_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_51550_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_71500_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_71501_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_71550_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_71551_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:abus:tvip_72500_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-16739
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 46 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-16739
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-09-11 |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | 2024-09-11 |
CWE ids for CVE-2018-16739
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2018-16739
-
https://sec.maride.cc/posts/abus/
Five Vulnerabilities in ABUS cameras :: sec.maride.ccExploit;Third Party Advisory
-
https://www.ccc.de/en/updates/2019/update-nicht-verfugbar-hersteller-nicht-zu-erreichen
CCC | Update nicht verfügbar: Lieferant nicht zu erreichenThird Party Advisory
Jump to