Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-7383

Опубликовано: 21 мар. 2019
Источник: nvd
CVSS3: 7.8
CVSS2: 7.2
EPSS Низкий

Описание

An issue was discovered on Systrome Cumilon ISG-600C, ISG-600H, and ISG-800W devices with firmware V1.1-R2.1_TRUNK-20181105.bin. A shell command injection occurs by editing the description of an ISP file. The file network/isp/isp_update_edit.php does not properly validate user input, which leads to shell command injection via the des parameter.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:systrome:cumilon_isg-600c_firmware:1.1-r2.1:*:*:*:*:*:*:*
cpe:2.3:h:systrome:cumilon_isg-600c:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:systrome:cumilon_isg-600h_firmware:1.1-r2.1:*:*:*:*:*:*:*
cpe:2.3:h:systrome:cumilon_isg-600h:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:systrome:cumilon_isg-800w_firmware:1.1-r2.1:*:*:*:*:*:*:*
cpe:2.3:h:systrome:cumilon_isg-800w:-:*:*:*:*:*:*:*

EPSS

Процентиль: 60%
0.00403
Низкий

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 7.8
github
больше 3 лет назад

An issue was discovered on Systrome Cumilon ISG-600C, ISG-600H, and ISG-800W devices with firmware V1.1-R2.1_TRUNK-20181105.bin. A shell command injection occurs by editing the description of an ISP file. The file network/isp/isp_update_edit.php does not properly validate user input, which leads to shell command injection via the des parameter.

EPSS

Процентиль: 60%
0.00403
Низкий

7.8 High

CVSS3

7.2 High

CVSS2

Дефекты

CWE-78