Описание
Command injection in homemng.htm in Juplink RX4-1500 versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows remote authenticated attackers to execute commands via specially crafted requests to the vulnerable endpoint.
Уязвимые конфигурации
Конфигурация 1
Одновременно
Одно из
cpe:2.3:o:juplink:rx4-1500_firmware:1.0.2:*:*:*:*:*:*:*
cpe:2.3:o:juplink:rx4-1500_firmware:1.0.3:*:*:*:*:*:*:*
cpe:2.3:o:juplink:rx4-1500_firmware:1.0.4:*:*:*:*:*:*:*
cpe:2.3:o:juplink:rx4-1500_firmware:1.0.5:*:*:*:*:*:*:*
cpe:2.3:h:juplink:rx4-1500:-:*:*:*:*:*:*:*
EPSS
Процентиль: 49%
0.00259
Низкий
8 High
CVSS3
8.8 High
CVSS3
7.7 High
CVSS2
Дефекты
CWE-77
CWE-77
Связанные уязвимости
CVSS3: 8
github
больше 2 лет назад
Command injection in homemng.htm in Juplink RX4-1500 versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows remote authenticated attackers to execute commands via specially crafted requests to the vulnerable endpoint.
EPSS
Процентиль: 49%
0.00259
Низкий
8 High
CVSS3
8.8 High
CVSS3
7.7 High
CVSS2
Дефекты
CWE-77
CWE-77