RunExeFile.exe in the installer for DEWESoft X3 SP1 (64-bit) devices does not require authentication for sessions on TCP port 1999, which allows remote attackers to execute arbitrary code or access internal commands, as demonstrated by a RUN command that launches a .EXE file located at an arbitrary external URL, or a "SETFIREWALL Off" command.
                
            References
                    | Link | Resource | 
|---|---|
| http://hyp3rlinx.altervista.org/advisories/DEWESOFT-X3-REMOTE-INTERNAL-COMMAND-ACCESS.txt | Exploit Third Party Advisory | 
| https://www.exploit-db.com/exploits/44275/ | Exploit Third Party Advisory VDB Entry | 
| http://hyp3rlinx.altervista.org/advisories/DEWESOFT-X3-REMOTE-INTERNAL-COMMAND-ACCESS.txt | Exploit Third Party Advisory | 
| https://www.exploit-db.com/exploits/44275/ | Exploit Third Party Advisory VDB Entry | 
Configurations
                    History
                    No history.
Information
                Published : 2018-03-15 01:29
Updated : 2024-11-21 04:12
NVD link : CVE-2018-7756
Mitre link : CVE-2018-7756
CVE.ORG link : CVE-2018-7756
JSON object : View
Products Affected
                dewesoft
- dewesoft
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
