Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4v32-6xw7-c96f

Опубликовано: 13 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

The /goform/formJsonAjaxReq POST endpoint of Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices mishandles the set_timesetting action with the ntpserver0 parameter, which is used in a system command. By setting a username=admin cookie (bypassing normal session checks), an unauthenticated attacker can use that parameter to execute arbitrary OS commands.

The /goform/formJsonAjaxReq POST endpoint of Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices mishandles the set_timesetting action with the ntpserver0 parameter, which is used in a system command. By setting a username=admin cookie (bypassing normal session checks), an unauthenticated attacker can use that parameter to execute arbitrary OS commands.

EPSS

Процентиль: 45%
0.00222
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 6.5
nvd
6 месяцев назад

The /goform/formJsonAjaxReq POST endpoint of Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices mishandles the set_timesetting action with the ntpserver0 parameter, which is used in a system command. By setting a username=admin cookie (bypassing normal session checks), an unauthenticated attacker can use that parameter to execute arbitrary OS commands.

EPSS

Процентиль: 45%
0.00222
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-78