Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x2cc-cqcm-pm2j

Опубликовано: 08 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 & 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-writable /tmp directory.

An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 & 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-writable /tmp directory.

EPSS

Процентиль: 7%
0.00027
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-307

Связанные уязвимости

CVSS3: 6.5
nvd
30 дней назад

An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6.4 & 4.6.8 in the GL.iNet custom opkg wrapper script located at /usr/libexec/opkg-call. The script is executed with root privileges when triggered via the LuCI web interface or authenticated API calls to manage packages. The vulnerable code uses shell redirection to create a lock file in the world-writable /tmp directory.

EPSS

Процентиль: 7%
0.00027
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-307