ping.cgi in NetCommWireless HSPA 3G10WVE wireless routers with firmware before 3G10WVE-L101-S306ETS-C01_R05 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the DIA_IPADDRESS parameter.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/136901/NetCommWireless-HSPA-3G10WVE-Authentication-Bypass-Code-Execution.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2016/May/13 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2016/May/18 | Mailing List Third Party Advisory |
http://www.securityfocus.com/archive/1/538263/100/0/threaded | |
http://www.securityfocus.com/archive/1/538297/100/0/threaded | |
https://www.exploit-db.com/exploits/39762/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2017-02-09 15:59
Updated : 2024-02-04 19:11
NVD link : CVE-2015-6024
Mitre link : CVE-2015-6024
CVE.ORG link : CVE-2015-6024
JSON object : View
Products Affected
netcommwireless
- hspa_3g10wve
- hspa_3g10wve_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')