Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j6m9-wmpr-q44c

Опубликовано: 09 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.7

Описание

AVTECH devices that include the CloudSetup.cgi management endpoint are vulnerable to authenticated OS command injection. The exefile parameter in CloudSetup.cgi is passed to the underlying system command execution without proper validation or whitelisting. An authenticated attacker who can invoke this endpoint can supply crafted input to execute arbitrary system commands as root. Successful exploitation grants full control of the device, and - depending on deployment and whether the device stores credentials or has network reachability to internal systems - may enable credential theft, lateral movement, or data exfiltration. An affected version range has not been defined by AVTECH.

AVTECH devices that include the CloudSetup.cgi management endpoint are vulnerable to authenticated OS command injection. The exefile parameter in CloudSetup.cgi is passed to the underlying system command execution without proper validation or whitelisting. An authenticated attacker who can invoke this endpoint can supply crafted input to execute arbitrary system commands as root. Successful exploitation grants full control of the device, and - depending on deployment and whether the device stores credentials or has network reachability to internal systems - may enable credential theft, lateral movement, or data exfiltration. An affected version range has not been defined by AVTECH.

EPSS

Процентиль: 70%
0.00651
Низкий

8.7 High

CVSS4

Дефекты

CWE-78

Связанные уязвимости

nvd
4 месяца назад

AVTECH devices that include the CloudSetup.cgi management endpoint are vulnerable to authenticated OS command injection. The `exefile` parameter in CloudSetup.cgi is passed to the underlying system command execution without proper validation or whitelisting. An authenticated attacker who can invoke this endpoint can supply crafted input to execute arbitrary system commands as root. Successful exploitation grants full control of the device, and - depending on deployment and whether the device stores credentials or has network reachability to internal systems - may enable credential theft, lateral movement, or data exfiltration. The archived SEARCH-LAB disclosure implies that this vulnerability was remediated in early 2017, but AVTECH has not defined an affected version range.

CVSS3: 8.8
fstec
больше 9 лет назад

Уязвимость микропрограммного обеспечения IP-камер, цифровых и сетевых видеорегистраторов AvtechAVTECH, связанная с непринятием мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 70%
0.00651
Низкий

8.7 High

CVSS4

Дефекты

CWE-78