Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jgc8-85r3-j7pm

Опубликовано: 12 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 6.3

Описание

A weakness has been identified in MiczFlor RPi-Jukebox-RFID up to 2.8.0. Affected by this vulnerability is an unknown functionality of the file /htdocs/api/playlist/shuffle.php. Executing manipulation of the argument playlist can lead to os command injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

A weakness has been identified in MiczFlor RPi-Jukebox-RFID up to 2.8.0. Affected by this vulnerability is an unknown functionality of the file /htdocs/api/playlist/shuffle.php. Executing manipulation of the argument playlist can lead to os command injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 64%
0.00471
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-77
CWE-78

Связанные уязвимости

CVSS3: 6.3
nvd
5 месяцев назад

A weakness has been identified in MiczFlor RPi-Jukebox-RFID up to 2.8.0. Affected by this vulnerability is an unknown functionality of the file /htdocs/api/playlist/shuffle.php. Executing manipulation of the argument playlist can lead to os command injection. The attack can be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 64%
0.00471
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-77
CWE-78