Описание
An issue was discovered in the OpenWebif plugin through 1.2.4 for E2 open devices. The saveConfig function of "plugin/controllers/models/config.py" performs an eval() call on the contents of the "key" HTTP GET parameter. This allows an unauthenticated remote attacker to execute arbitrary Python code or OS commands via api/saveconfig.
Ссылки
- Third Party AdvisoryVDB Entry
- ExploitIssue TrackingThird Party Advisory
- Third Party AdvisoryVDB Entry
- ExploitIssue TrackingThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.2.4 (включая)
cpe:2.3:a:openwebif_project:openwebif:*:*:*:*:*:*:*:*
EPSS
Процентиль: 94%
0.14043
Средний
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-94
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
An issue was discovered in the OpenWebif plugin through 1.2.4 for E2 open devices. The saveConfig function of "plugin/controllers/models/config.py" performs an eval() call on the contents of the "key" HTTP GET parameter. This allows an unauthenticated remote attacker to execute arbitrary Python code or OS commands via api/saveconfig.
EPSS
Процентиль: 94%
0.14043
Средний
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-94