Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6mx4-p8p9-328j

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.

Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.

EPSS

Процентиль: 94%
0.11924
Средний

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 8.8
nvd
больше 4 лет назад

Multiple buffer overflows in the limited configuration shell (/sbin/gs_config) on Grandstream HT801 devices before 1.0.29 allow remote authenticated users to execute arbitrary code as root via a crafted manage_if setting, thus bypassing the intended restrictions of this shell and taking full control of the device. There are default weak credentials that can be used to authenticate.

EPSS

Процентиль: 94%
0.11924
Средний

Дефекты

CWE-787