Adtran SR400ac ping Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adtran SR400ac routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.
The specific flaw exists within the ping command, which is available over JSON-RPC. A crafted host parameter can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root.
. Was ZDI-CAN-20525.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1010/ |
![]() ![]() ![]() |
History
Tue, 12 Aug 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Adtran
Adtran sr400ac Adtran sr400ac Firmware |
|
Weaknesses | CWE-77 | |
CPEs | cpe:2.3:h:adtran:sr400ac:-:*:*:*:*:*:*:* cpe:2.3:o:adtran:sr400ac_firmware:10.8.5.1:*:*:*:*:*:*:* cpe:2.3:o:adtran:sr400ac_firmware:10.8.8.1:*:*:*:*:*:*:* |
|
Vendors & Products |
Adtran
Adtran sr400ac Adtran sr400ac Firmware |
Wed, 18 Sep 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Adtran SR400ac ping Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adtran SR400ac routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ping command, which is available over JSON-RPC. A crafted host parameter can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20525. | Adtran SR400ac ping Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Adtran SR400ac routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ping command, which is available over JSON-RPC. A crafted host parameter can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-20525. |

Status: PUBLISHED
Assigner: zdi
Published: 2024-05-03T01:59:17.554Z
Updated: 2024-09-18T18:29:35.917Z
Reserved: 2023-07-12T15:22:20.622Z
Link: CVE-2023-38120

Updated: 2024-08-02T17:30:13.987Z

Status : Analyzed
Published: 2024-05-03T02:15:56.207
Modified: 2025-08-12T15:51:54.750
Link: CVE-2023-38120

No data.