Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g83g-x6pg-6c84

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Yachtcontrol through 2019-10-06: It's possible to perform direct Operating System commands as an unauthenticated user via the "/pages/systemcall.php?command={COMMAND}" page and parameter, where {COMMAND} will be executed and returning the results to the client. Affects Yachtcontrol webservers disclosed via Dutch GPRS/4G mobile IP-ranges. IP addresses vary due to DHCP client leasing of telco's.

Yachtcontrol through 2019-10-06: It's possible to perform direct Operating System commands as an unauthenticated user via the "/pages/systemcall.php?command={COMMAND}" page and parameter, where {COMMAND} will be executed and returning the results to the client. Affects Yachtcontrol webservers disclosed via Dutch GPRS/4G mobile IP-ranges. IP addresses vary due to DHCP client leasing of telco's.

EPSS

Процентиль: 100%
0.93937
Критический

Связанные уязвимости

CVSS3: 9.8
nvd
около 6 лет назад

Yachtcontrol through 2019-10-06: It's possible to perform direct Operating System commands as an unauthenticated user via the "/pages/systemcall.php?command={COMMAND}" page and parameter, where {COMMAND} will be executed and returning the results to the client. Affects Yachtcontrol webservers disclosed via Dutch GPRS/4G mobile IP-ranges. IP addresses vary due to DHCP client leasing of telco's.

CVSS3: 9.8
fstec
больше 6 лет назад

Уязвимость веб-серверов навигационного программного обеспечения Yachtcontrol, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.93937
Критический