Описание
A remote code execution vulnerability is identified in FruityWifi through 2.4. Due to improperly escaped shell metacharacters obtained from the POST request at the page_config_adv.php page, it is possible to perform remote code execution by an authenticated attacker. This is similar to CVE-2018-17317.
Ссылки
- Vendor Advisory
- ExploitThird Party Advisory
- Third Party Advisory
- Vendor Advisory
- ExploitThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.4 (включая)
cpe:2.3:a:fruitywifi_project:fruitywifi:*:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.04767
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-78
Связанные уязвимости
github
больше 3 лет назад
A remote code execution vulnerability is identified in FruityWifi through 2.4. Due to improperly escaped shell metacharacters obtained from the POST request at the page_config_adv.php page, it is possible to perform remote code execution by an authenticated attacker. This is similar to CVE-2018-17317.
EPSS
Процентиль: 89%
0.04767
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-78