Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gvmq-4gxq-mx44

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.

iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.

EPSS

Процентиль: 95%
0.20286
Средний

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 8.8
nvd
почти 5 лет назад

iWT Ltd FaceSentry Access Control System 6.4.8 suffers from an authenticated OS command injection vulnerability using default credentials. This can be exploited to inject and execute arbitrary shell commands as the root user via the 'strInIP' POST parameter in pingTest PHP script.

EPSS

Процентиль: 95%
0.20286
Средний

Дефекты

CWE-78