Описание
ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote attackers to execute arbitrary commands via shell metacharacters in the pip parameter in an Ajax tag_ipPing request, a different vulnerability than CVE-2013-3581.
Ссылки
- ExploitUS Government Resource
- ExploitUS Government Resource
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:h:choice-wireless:wixfmr-111:-:*:*:*:*:*:*:*
EPSS
Процентиль: 67%
0.00527
Низкий
9.3 Critical
CVSS2
Дефекты
CWE-287
Связанные уязвимости
github
больше 3 лет назад
ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote attackers to execute arbitrary commands via shell metacharacters in the pip parameter in an Ajax tag_ipPing request, a different vulnerability than CVE-2013-3581.
EPSS
Процентиль: 67%
0.00527
Низкий
9.3 Critical
CVSS2
Дефекты
CWE-287