Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-54vf-jrm9-p98w

Опубликовано: 01 дек. 2021
Источник: github
Github: Не прошло ревью

Описание

This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.

This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.

EPSS

Процентиль: 74%
0.00806
Низкий

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 8.8
nvd
около 4 лет назад

This issue was discovered when the ipTIME C200 IP Camera was synchronized with the ipTIME NAS. It is necessary to extract value for ipTIME IP camera because the ipTIME NAS send ans setCookie('[COOKIE]') . The value is transferred to the --header option in wget binary, and there is no validation check. This vulnerability allows remote attackers to execute remote command.

EPSS

Процентиль: 74%
0.00806
Низкий

Дефекты

CWE-78