Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8w2m-3cmp-47gw

Опубликовано: 31 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution.

In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution.

EPSS

Процентиль: 90%
0.05085
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 9.8
nvd
10 месяцев назад

In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injection in the function addmap_exec which parses the NewInternalClient parameter of the AddPortMapping SOAPAction into a system call without sanitation. An attacker can send a specially crafted SOAPAction request for AddPortMapping via the router's WANIPConn1 service to achieve arbitrary command execution.

CVSS3: 8.8
fstec
около 1 года назад

Уязвимость метода AddPortMapping микропрограммного обеспечения маршрутизаторов Netgear WNR854T, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 90%
0.05085
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-94