Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5gp6-hwm5-6f8j

Опубликовано: 27 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 2
CVSS3: 4.7

Описание

A vulnerability was detected in Keyfactor RG-EW5100BE EW_3.0B11P280_EW5100BE-PRO_12183019. The affected element is an unknown function of the file /cgi-bin/luci/api/cmd of the component HTTP POST Request Handler. The manipulation of the argument url results in command injection. The attack can be launched remotely. The exploit is now public and may be used.

A vulnerability was detected in Keyfactor RG-EW5100BE EW_3.0B11P280_EW5100BE-PRO_12183019. The affected element is an unknown function of the file /cgi-bin/luci/api/cmd of the component HTTP POST Request Handler. The manipulation of the argument url results in command injection. The attack can be launched remotely. The exploit is now public and may be used.

EPSS

Процентиль: 53%
0.003
Низкий

2 Low

CVSS4

4.7 Medium

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 4.7
nvd
4 месяца назад

A vulnerability was detected in Keyfactor RG-EW5100BE EW_3.0B11P280_EW5100BE-PRO_12183019. The affected element is an unknown function of the file /cgi-bin/luci/api/cmd of the component HTTP POST Request Handler. The manipulation of the argument url results in command injection. The attack can be launched remotely. The exploit is now public and may be used.

EPSS

Процентиль: 53%
0.003
Низкий

2 Low

CVSS4

4.7 Medium

CVSS3

Дефекты

CWE-74