CVE-2018-16618

CVSS V2 High 10 CVSS V3 Critical 9.8
Description
VTech Storio Max before 56.D3JM6 allows remote command execution via shell metacharacters in an Android activity name. It exposes the storeintenttranslate.x service on port 1668 listening for requests on localhost. Requests submitted to this service are checked for a string of random characters followed by the name of an Android activity to start. Activities are started by inserting their name into a string that is executed in a shell command. By inserting metacharacters this can be exploited to run arbitrary commands as root. The requests also match those of the HTTP protocol and can be triggered on any web page rendered on the device by requesting resources stored at an http://127.0.0.1:1668/ URI, as demonstrated by the http://127.0.0.1:1668/dacdb70556479813fab2d92896596eef?';{ping,example.org}' URL.
Overview
  • CVE ID
  • CVE-2018-16618
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2019-06-19T18:15:10
  • Last Modified Date
  • 2020-08-24T17:37:01
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:vtech:storio_max_firmware:*:*:*:*:*:*:*:* 1 OR 56.d3jm6
cpe:2.3:h:vtech:80-183803:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:vtech:80-183804:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:vtech:80-183805:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:vtech:80-183807:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:vtech:80-183822:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:vtech:80-183823:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:vtech:80-183824:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:vtech:80-1838xx:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 10
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://www.vtech.com/en/our-businesses/product-support/ Vendor Advisory
https://www.surecloud.com/sc-blog/vtech Exploit Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 16:30:12 Added to TrackCVE
2022-12-03 22:17:15 2019-06-19T18:15Z 2019-06-19T18:15:10 CVE Published Date updated
2022-12-03 22:17:15 2020-08-24T17:37:01 CVE Modified Date updated
2022-12-03 22:17:15 Analyzed Vulnerability Status updated