Lucene search

K
prionPRIOn knowledge basePRION:CVE-2018-10987
HistoryJul 05, 2018 - 8:29 p.m.

Remote code execution

2018-07-0520:29:00
PRIOn knowledge base
www.prio-n.com
2

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.6%

An issue was discovered on Dongguan Diqee Diqee360 devices. The affected vacuum cleaner suffers from an authenticated remote code execution vulnerability. An authenticated attacker can send a specially crafted UDP packet, and execute commands on the vacuum cleaner as root. The bug is in the function REQUEST_SET_WIFIPASSWD (UDP command 153). A crafted UDP packet runs ā€œ/mnt/skyeye/mode_switch.sh %sā€ with an attacker controlling the %s variable. In some cases, authentication can be achieved with the default password of 888888 for the admin account.

8.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.6%

Related for PRION:CVE-2018-10987