Логотип exploitDog
bind:CVE-2018-20334
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-20334

Количество 2

Количество 2

nvd логотип

CVE-2018-20334

почти 6 лет назад

An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-xgrv-mpr3-8pg9

больше 3 лет назад

An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-20334

An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell.

CVSS3: 9.8
4%
Низкий
почти 6 лет назад
github логотип
GHSA-xgrv-mpr3-8pg9

An issue was discovered in ASUSWRT 3.0.0.4.384.20308. When processing the /start_apply.htm POST data, there is a command injection issue via shell metacharacters in the fb_email parameter. By using this issue, an attacker can control the router and get shell.

4%
Низкий
больше 3 лет назад

Уязвимостей на страницу