Three OS command injection vulnerabilities exist in the web interface I/O configuration functionality of MC Technologies MC LR Router 2.10.5. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability refers to the authetnicated OS Command injection that occurs through the attacker-controlled `timer1` parameter, at offset `0x8e80`.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1953 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
26 Aug 2025, 01:22
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
First Time |
Mc-technologies
Mc-technologies mc Lr Router Mc-technologies mc Lr Router Firmware |
|
CPE | cpe:2.3:o:mc-technologies:mc_lr_router_firmware:2.10.5:*:*:*:*:*:*:* cpe:2.3:h:mc-technologies:mc_lr_router:-:*:*:*:*:*:*:* |
|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1953 - Exploit, Third Party Advisory |
21 Nov 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-21 15:15
Updated : 2025-08-26 01:22
NVD link : CVE-2024-28027
Mitre link : CVE-2024-28027
CVE.ORG link : CVE-2024-28027
JSON object : View
Products Affected
mc-technologies
- mc_lr_router
- mc_lr_router_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')