Mikrotik RouterOS Telnet Arbitrary...

- AV AC AU C I A
发布: 2018-12-14
修订: 2025-04-13

An exploitable arbitrary file creation weakness has been identified in Mikrotik RouterOS that can be leveraged by a malicious attacker to exploit all known versions of Mikrotik RouterOS. The RouterOS contains a telnet client based on GNU inetutils with modifications to remove shell subsystem. However an attacker can leverage the "set tracefile" option to write an arbitrary file into any "rw" area of the filesystem, escaping the restricted shell to gain access to a "ash" busybox shell on some versions. The file is created with root privileges regardless of the RouterOS defined group.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息