Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3gvm-h59h-xc2f

Опубликовано: 26 нояб. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "mp_apply" API which are not properly sanitized before being concatenated to OS level commands.

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "mp_apply" API which are not properly sanitized before being concatenated to OS level commands.

EPSS

Процентиль: 75%
0.00869
Низкий

7.2 High

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 7.2
nvd
около 1 года назад

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "mp_apply" API which are not properly sanitized before being concatenated to OS level commands.

CVSS3: 7.2
fstec
около 1 года назад

Уязвимость прикладного программного интерфейса «mp_apply» микропрограммного обеспечения многофункциональных беспроводных точек доступа Advantech EKI-6333AC-2G, EKI-6333AC-2GD и EKI-6333AC-1GPO, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 75%
0.00869
Низкий

7.2 High

CVSS3

Дефекты

CWE-78