Description
RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below are vulnerable to an arbitrary directory creation vulnerability via the upgrade package's name field. If an authenticated user installs a malicious package then a directory could be created and the developer shell could be enabled.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-13583 | RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below are vulnerable to an arbitrary directory creation vulnerability via the upgrade package's name field. If an authenticated user installs a malicious package then a directory could be created and the developer shell could be enabled. |
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2019-46 |
|
History
No history.
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2024-08-04T19:26:27.527Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3976
No data.
Status : Modified
Published: 2019-10-29T19:15:20.297
Modified: 2024-11-21T04:42:59.397
Link: CVE-2019-3976
No data.
OpenCVE Enrichment
No data.
EUVD