Описание
In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.
Ссылки
- Product
- ExploitThird Party Advisory
- Product
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.1.3.0 (включая)
Одновременно
cpe:2.3:o:viessmann:vitogate_300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:viessmann:vitogate_300:-:*:*:*:*:*:*:*
EPSS
Процентиль: 100%
0.93587
Критический
9.8 Critical
CVSS3
Дефекты
CWE-77
Связанные уязвимости
CVSS3: 9.8
github
больше 2 лет назад
In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.
EPSS
Процентиль: 100%
0.93587
Критический
9.8 Critical
CVSS3
Дефекты
CWE-77