vendor:
FortiCam MB40
by:
Aaron Blair (@xorcat)
8.8
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: FortiCam MB40
Affected Version From: v1.2.0.0
Affected Version To: v1.2.0.0
Patch Exists: YES
Related CWE: TBA
CPE: h:fortinet:forticam_mb40
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux
2019
FCM-MB40 Remote Command Execution as Root via CSRF
This exploit allows an attacker to execute arbitrary commands as root on a Fortinet FortiCam MB40 device. The exploit works by using a crafted HTML document that contains a malicious JavaScript code. The code creates an image element with a URL that contains a command injection payload. This payload is then executed when the URL is requested. The command injection payload is used to create a reverse shell from the device to the attacker's host, allowing the attacker to execute arbitrary commands as root.
Mitigation:
The best way to mitigate this vulnerability is to ensure that the device is running the latest version of the firmware. Additionally, users should ensure that the device is not exposed to the public internet and that access to the device is restricted to trusted users.