Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wwjp-jvvh-qm5p

Опубликовано: 15 июл. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

Verizon 5G Home LVSKIHP OutDoorUnit (ODU) 3.33.101.0 does not property sanitize user-controlled parameters within the crtcswitchsimprofile function of the crtcrpc JSON listener. A remote attacker on the local network can inject shell metacharacters into /usr/lib/lua/5.1/luci/controller/rpc.lua to achieve remote code execution as root,

Verizon 5G Home LVSKIHP OutDoorUnit (ODU) 3.33.101.0 does not property sanitize user-controlled parameters within the crtcswitchsimprofile function of the crtcrpc JSON listener. A remote attacker on the local network can inject shell metacharacters into /usr/lib/lua/5.1/luci/controller/rpc.lua to achieve remote code execution as root,

EPSS

Процентиль: 89%
0.04386
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-116

Связанные уязвимости

CVSS3: 9.8
nvd
больше 3 лет назад

Verizon 5G Home LVSKIHP OutDoorUnit (ODU) 3.33.101.0 does not property sanitize user-controlled parameters within the crtcswitchsimprofile function of the crtcrpc JSON listener. A remote attacker on the local network can inject shell metacharacters into /usr/lib/lua/5.1/luci/controller/rpc.lua to achieve remote code execution as root,

EPSS

Процентиль: 89%
0.04386
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-116