Geutebruck.CGI.uapi.Remote.Command.Execution

description-logoDescription

This indicates an attack attempt to exploit an Authentication Bypass Vulnerability in Geutebruck devices.
This vulnerability is due to improper handling of a crafted HTTP request. A remote attacker could exploit this vulnerability by sending a crafted HTTP request to the target device. Successful exploitation of the vulnerability could lead to execution of arbitrary code.

affected-products-logoAffected Products

Geutebruck G-Cam EEC-2xxx series with firmware version 1.12.13.2, version 1.12.14.5, version 1.12.0.27, and version prior to 1.12.0.27
Geutebruck G-Code EBC-21xx series with firmware version 1.12.13.2, version 1.12.14.5, version 1.12.0.27, and version prior to 1.12.0.27
Geutebruck G-Code EFD-22xx series with firmware version 1.12.13.2, version 1.12.14.5, version 1.12.0.27, and version prior to 1.12.0.27
Geutebruck G-Code ETHC-22xx series with firmware version 1.12.13.2, version 1.12.14.5, version 1.12.0.27, and version prior to 1.12.0.27
Geutebruck G-Code EWPC-22xx series with firmware version 1.12.13.2, version 1.12.14.5, version 1.12.0.27, and version prior to 1.12.0.27

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://portal.geutebrueck.com/

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2021-10-27 18.186 Sig Added
2021-10-13 18.177 Default_action:pass:drop
2021-10-04 18.169