Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7jmp-6wfw-34gv

Опубликовано: 17 янв. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3

Описание

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Newtec/iDirect NTC2218, NTC2250, NTC2299 on Linux, PowerPC, ARM allows Local Code Inclusion.This issue affects NTC2218, NTC2250, NTC2299: from 1.0.1.1 through 2.2.6.19.

The commit_multicast page used to configure multicasts in the modem's web administration interface uses improperly parses incoming data from the request before passing it to an eval statement in a bash script. This allows attackers to inject arbitrary shell commands.

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Newtec/iDirect NTC2218, NTC2250, NTC2299 on Linux, PowerPC, ARM allows Local Code Inclusion.This issue affects NTC2218, NTC2250, NTC2299: from 1.0.1.1 through 2.2.6.19.

The commit_multicast page used to configure multicasts in the modem's web administration interface uses improperly parses incoming data from the request before passing it to an eval statement in a bash script. This allows attackers to inject arbitrary shell commands.

EPSS

Процентиль: 79%
0.01257
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-78

Связанные уязвимости

nvd
около 1 года назад

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Newtec/iDirect NTC2218, NTC2250, NTC2299 on Linux, PowerPC, ARM allows Local Code Inclusion.This issue affects NTC2218, NTC2250, NTC2299: from 1.0.1.1 through 2.2.6.19. The `commit_multicast` page used to configure multicasts in the modem's web administration interface uses improperly parses incoming data from the request before passing it to an `eval` statement in a bash script. This allows attackers to inject arbitrary shell commands.

EPSS

Процентиль: 79%
0.01257
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-78