Описание
A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be executed with root privileges.
Ссылки
- ExploitThird Party Advisory
- ExploitTechnical DescriptionThird Party Advisory
- ExploitThird Party Advisory
- ExploitTechnical DescriptionThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:embedthis:goahead:-:*:*:*:*:*:*:*
EPSS
Процентиль: 71%
0.00673
Низкий
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-77
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
A command-injection vulnerability exists in a web application on a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models. The mail-sending form in the mail.htm page allows an attacker to inject a command into the receiver1 field in the form; it will be executed with root privileges.
EPSS
Процентиль: 71%
0.00673
Низкий
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-77