vendor:
IP3
by:
r00t
8.8
CVSS
HIGH
Forcing into shell
N/A
CWE
Product Name: IP3
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009
NetAccess IP3 – Force into shell
NetAccess IP3 is a device created for high demand environments such as convention centers or hotels. It handles the Internet access and provides for instance firewalling, billing, rate-limiting as well as various authentication mechanisms. The device is administrated via SSH or a web-based GUI. An attacker can force into shell by logging into the IP3's IP address, selecting the 'ping' option (usually menu item 5), and pinging the address: localhost && sh. After four pings to localhost, shell will be forced open.
Mitigation:
Ensure that the IP3 is configured with the latest security patches and updates.