Описание
OS command injection in the AP mode settings feature in /cgi-bin/luci /api/misystem/set_router_wifiap on Xiaomi R3D before 2.26.4 devices allows an attacker to execute any command via crafted JSON data.
Ссылки
- Third Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.26.4 (исключая)
Одновременно
cpe:2.3:o:mi:xiaomi_r3d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mi:xiaomi_r3d:-:*:*:*:*:*:*:*
EPSS
Процентиль: 93%
0.10765
Средний
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-78
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
OS command injection in the AP mode settings feature in /cgi-bin/luci /api/misystem/set_router_wifiap on Xiaomi R3D before 2.26.4 devices allows an attacker to execute any command via crafted JSON data.
EPSS
Процентиль: 93%
0.10765
Средний
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-78