vendor:
Yoggie Pico, Yoggie Pico Pro
by:
Unknown
7.5
CVSS
HIGH
Remote Code Execution
20
CWE
Product Name: Yoggie Pico, Yoggie Pico Pro
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: h:yoggie:pico cpe:/h:yoggie:pico_pro
Platforms Tested:
Unknown
Yoggie Pico and Pico Pro Remote Code-Execution Vulnerability
The Yoggie Pico and Pico Pro devices are vulnerable to a remote code-execution vulnerability due to insufficient input sanitization. An attacker can exploit this vulnerability to execute arbitrary code with superuser privileges, leading to a complete compromise of the affected devices. The attacker can replace the original /etc/shadow file to set the root password of their choosing and gain complete control over the device by running dropbear sshd on a specific port.
Mitigation:
It is recommended to apply the latest firmware update provided by the vendor to fix this vulnerability. Additionally, it is advised to restrict access to the affected devices and ensure they are not directly exposed to the internet.