{ "schema_version": "1.4.0", "id": "GHSA-qcm5-vh67-wxvj", "modified": "2022-05-14T01:10:43Z", "published": "2022-05-14T01:10:43Z", "aliases": [ "CVE-2018-20487" ], "details": "An issue was discovered in the firewall3 component in Inteno IOPSYS 1.0 through 3.16. The attacker must make a JSON-RPC method call to add a firewall rule as an \"include\" and point the \"path\" argument to a malicious script or binary. This gets executed as root when the firewall changes are committed.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20487" }, { "type": "WEB", "url": "https://neonsea.uk/blog/2018/12/26/firewall-includes.html" }, { "type": "WEB", "url": "http://public.inteno.se/?p=feed-inteno-openwrt.git;a=commit;h=e6159ca928d7f0c143be213afc6bf810c0329fe2" } ], "database_specific": { "cwe_ids": [ "CWE-20" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-04-11T21:29:00Z" } }