Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qmf6-mw8h-6m87

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Bash injection vulnerability and bypass of signature verification in Rostelecom CS-C2SHW 5.0.082.1. The camera reads firmware update configuration from SD card file vc\version.json. fw-sign parameter and from this configuration is directly inserted into a bash command. Firmware update is run automatically if there is special file on the inserted SD card.

Bash injection vulnerability and bypass of signature verification in Rostelecom CS-C2SHW 5.0.082.1. The camera reads firmware update configuration from SD card file vc\version.json. fw-sign parameter and from this configuration is directly inserted into a bash command. Firmware update is run automatically if there is special file on the inserted SD card.

EPSS

Процентиль: 42%
0.00203
Низкий

Дефекты

CWE-347

Связанные уязвимости

CVSS3: 9.8
nvd
около 5 лет назад

Bash injection vulnerability and bypass of signature verification in Rostelecom CS-C2SHW 5.0.082.1. The camera reads firmware update configuration from SD card file vc\version.json. fw-sign parameter and from this configuration is directly inserted into a bash command. Firmware update is run automatically if there is special file on the inserted SD card.

EPSS

Процентиль: 42%
0.00203
Низкий

Дефекты

CWE-347