Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3f9w-43j6-x43v

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API.

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API.

EPSS

Процентиль: 95%
0.18523
Средний

Связанные уязвимости

CVSS3: 9.8
nvd
больше 5 лет назад

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API.

EPSS

Процентиль: 95%
0.18523
Средний