On Cisco DDR2200 ADSL2+ Residential Gateway DDR2200B-NA-AnnexA-FCC-V00.00.03.45.4E and DDR2201v1 ADSL2+ Residential Gateway DDR2201v1-NA-AnnexA-FCC-V00.00.03.28.3 devices, there is remote command execution via shell metacharacters in the pingAddr parameter to the waitPingqry.cgi URI. The command output is visible at /PingMsg.cmd.
                
            References
                    | Link | Resource | 
|---|---|
| http://seclists.org/fulldisclosure/2017/Jul/26 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/bid/99963 | Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2017/Jul/26 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/bid/99963 | Third Party Advisory VDB Entry | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 03:08
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://seclists.org/fulldisclosure/2017/Jul/26 - Mailing List, Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/99963 - Third Party Advisory, VDB Entry | 
Information
                Published : 2017-07-24 00:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-11588
Mitre link : CVE-2017-11588
CVE.ORG link : CVE-2017-11588
JSON object : View
Products Affected
                cisco
- residential_gateway_firmware
 - residential_gateway
 
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
