RSS   Vulnerabilities for 'A30 firmware'   RSS

2018-08-29
 
CVE-2018-6597

CWE-noinfo
 

 
The Alcatel A30 device with a build fingerprint of TCL/5046G/MICKEY6US:7.0/NRD90M/J63:user/release-keys contains a hidden privilege escalation capability to achieve command execution as the root user. They have made modifications that allow a user with physical access to the device to obtain a root shell via ADB. Modifying the read-only properties by an app as the system user creates a UNIX domain socket named factory_test that will execute commands as the root user by processes that have privilege to access it (as per the SELinux rules that the vendor controls).

 

 >>> Vendor: Alcatel 10 Products
Omniswitch
Speed touch home
Adsl modem 1000
Speed touch adsl modem
AOS
Omniswitch 7800
Speedtouch 7g router
Speedtouch 5x6 router firmware
Speedtouch 5x6 router
A30 firmware


Copyright 2024, cxsecurity.com

 

Back to Top