Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-78f9-wrgm-7qqc

Опубликовано: 31 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.9
CVSS3: 7.3

Описание

A vulnerability, which was classified as critical, has been found in Digital China DCME-520 up to 20250320. This issue affects some unknown processing of the file /usr/local/WWW/function/audit/newstatistics/mon_merge_stat_hist.php. The manipulation of the argument type_name leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

A vulnerability, which was classified as critical, has been found in Digital China DCME-520 up to 20250320. This issue affects some unknown processing of the file /usr/local/WWW/function/audit/newstatistics/mon_merge_stat_hist.php. The manipulation of the argument type_name leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

EPSS

Процентиль: 74%
0.00812
Низкий

6.9 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 7.3
nvd
10 месяцев назад

A vulnerability, which was classified as critical, has been found in Digital China DCME-520 up to 20250320. This issue affects some unknown processing of the file /usr/local/WWW/function/audit/newstatistics/mon_merge_stat_hist.php. The manipulation of the argument type_name leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

EPSS

Процентиль: 74%
0.00812
Низкий

6.9 Medium

CVSS4

7.3 High

CVSS3

Дефекты

CWE-77