Описание
Command injection vulnerability in the homemng.htm endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows authenticated remote attackers to execute commands as root via specially crafted HTTP requests to the vulnerable endpoint.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
Одно из
cpe:2.3:o:juplink:rx4-1500_firmware:1.0.2:*:*:*:*:*:*:*
cpe:2.3:o:juplink:rx4-1500_firmware:1.0.3:*:*:*:*:*:*:*
cpe:2.3:o:juplink:rx4-1500_firmware:1.0.4:*:*:*:*:*:*:*
cpe:2.3:o:juplink:rx4-1500_firmware:1.0.5:*:*:*:*:*:*:*
cpe:2.3:h:juplink:rx4-1500:-:*:*:*:*:*:*:*
EPSS
Процентиль: 39%
0.00175
Низкий
8 High
CVSS3
8.8 High
CVSS3
7.7 High
CVSS2
Дефекты
CWE-77
CWE-77
Связанные уязвимости
CVSS3: 8
github
больше 2 лет назад
Command injection vulnerability in the homemng.htm endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows authenticated remote attackers to execute commands as root via specially crafted HTTP requests to the vulnerable endpoint.
EPSS
Процентиль: 39%
0.00175
Низкий
8 High
CVSS3
8.8 High
CVSS3
7.7 High
CVSS2
Дефекты
CWE-77
CWE-77