cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote attackers to execute arbitrary commands via shell metacharacters in the query string.
References
Configurations
History
21 Nov 2024, 00:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://core.ifconfig.se/~core/?p=21 - | |
References | () http://osvdb.org/44267 - Exploit | |
References | () http://secunia.com/advisories/29551 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/490100/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/28458 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41492 - |
Information
Published : 2009-03-30 20:30
Updated : 2024-11-21 00:56
NVD link : CVE-2008-6554
Mitre link : CVE-2008-6554
CVE.ORG link : CVE-2008-6554
JSON object : View
Products Affected
aztech
- adsl2\/2\+4-port_router
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')