Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-18370

Опубликовано: 23 окт. 2019
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Средний

Описание

An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. The backup file is in tar.gz format. After uploading, the application uses the tar zxf command to decompress, so one can control the contents of the files in the decompressed directory. In addition, the application's sh script for testing upload and download speeds reads a URL list from /tmp/speedtest_urls.xml, and there is a command injection vulnerability, as demonstrated by api/xqnetdetect/netspeed.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:mi:millet_router_3g_firmware:*:*:*:*:*:*:*:*
Версия до 2.28.23 (исключая)
cpe:2.3:h:mi:millet_router_3g:-:*:*:*:*:*:*:*

EPSS

Процентиль: 98%
0.64013
Средний

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-78

Связанные уязвимости

github
больше 3 лет назад

An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. The backup file is in tar.gz format. After uploading, the application uses the tar zxf command to decompress, so one can control the contents of the files in the decompressed directory. In addition, the application's sh script for testing upload and download speeds reads a URL list from /tmp/speedtest_urls.xml, and there is a command injection vulnerability, as demonstrated by api/xqnetdetect/netspeed.

EPSS

Процентиль: 98%
0.64013
Средний

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-78