An issue was discovered on AudioCodes 450HD IP Phone devices with firmware 3.0.0.535.106. The traceroute and ping functionality, which uses a parameter in a request to command.cgi from the Monitoring page in the web UI, unsafely puts user-alterable data directly into an OS command, leading to Remote Code Execution via shell metacharacters in the query string.
References
Link | Resource |
---|---|
https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-5757 | Exploit Third Party Advisory |
https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-5757 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-5757 - Exploit, Third Party Advisory |
Information
Published : 2019-04-01 17:29
Updated : 2024-11-21 04:09
NVD link : CVE-2018-5757
Mitre link : CVE-2018-5757
CVE.ORG link : CVE-2018-5757
JSON object : View
Products Affected
audiocodes
- 420hd_ip_phone_firmware
- 420hd_ip_phone
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')