Описание
On the Polycom Obihai Obi1022 VoIP phone with firmware 5.1.11, a command injection (missing input validation) issue in the NTP server IP address field for the "Time Service Settings web" interface allows an authenticated remote attacker in the same network to trigger OS commands via shell commands in a POST request.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:polycom:obihai_obi1022_firmware:5.1.11:*:*:*:*:*:*:*
cpe:2.3:h:polycom:obihai_obi1022:-:*:*:*:*:*:*:*
EPSS
Процентиль: 87%
0.03399
Низкий
8 High
CVSS3
7.7 High
CVSS2
Дефекты
CWE-78
Связанные уязвимости
github
больше 3 лет назад
On the Polycom Obihai Obi1022 VoIP phone with firmware 5.1.11, a command injection (missing input validation) issue in the NTP server IP address field for the "Time Service Settings web" interface allows an authenticated remote attacker in the same network to trigger OS commands via shell commands in a POST request.
EPSS
Процентиль: 87%
0.03399
Низкий
8 High
CVSS3
7.7 High
CVSS2
Дефекты
CWE-78