An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise.
References
Link | Resource |
---|---|
https://cxsecurity.com/issue/WLB-2017060050 | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/142792 | Broken Link |
https://vulncheck.com/advisories/engenius-enshare-iot-gigabit-cloud-service | Third Party Advisory |
https://www.exploit-db.com/exploits/42114 | Exploit Third Party Advisory |
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php | Exploit Third Party Advisory |
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
09 Jul 2025, 19:08
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:engeniustech:esr1200:-:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.9:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.9:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.11:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.3.1.26:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.9:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr900:-:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.2.2.23:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.3.1.63:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.4.1:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.1.28:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.1.0.28:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.11:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr350:-:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.1:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.7.20:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.2.2.27:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr600:-:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.1.0.29:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.7:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.3.1.34:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.3.17:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.1.0.50:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.1:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.2.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.3.5.18:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.3.1.42:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.9.21:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.0.23:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.2.1.46:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.3.1.34:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.3.1.41:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr300:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:epg5000:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr1750:-:*:*:*:*:*:*:* |
|
First Time |
Engeniustech epg5000
Engeniustech esr300 Firmware Engeniustech esr1750 Firmware Engeniustech esr1200 Firmware Engeniustech esr900 Engeniustech esr600 Firmware Engeniustech Engeniustech esr600 Engeniustech esr350 Engeniustech esr350 Firmware Engeniustech esr1200 Engeniustech esr300 Engeniustech esr900 Firmware Engeniustech epg5000 Firmware Engeniustech esr1750 |
|
References | () https://cxsecurity.com/issue/WLB-2017060050 - Exploit, Third Party Advisory | |
References | () https://packetstormsecurity.com/files/142792 - Broken Link | |
References | () https://vulncheck.com/advisories/engenius-enshare-iot-gigabit-cloud-service - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/42114 - Exploit, Third Party Advisory | |
References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
26 Jun 2025, 18:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 Jun 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php - |
24 Jun 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
24 Jun 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-24 01:15
Updated : 2025-07-09 19:08
NVD link : CVE-2025-34035
Mitre link : CVE-2025-34035
CVE.ORG link : CVE-2025-34035
JSON object : View
Products Affected
engeniustech
- esr300
- esr600_firmware
- esr600
- esr1200_firmware
- esr300_firmware
- epg5000_firmware
- epg5000
- esr350_firmware
- esr900
- esr350
- esr900_firmware
- esr1750_firmware
- esr1200
- esr1750