Логотип exploitDog
bind:CVE-2019-15800
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-15800

Количество 3

Количество 3

nvd логотип

CVE-2019-15800

около 6 лет назад

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the firmware, an attacker could leverage these functions to call system() and execute arbitrary commands on the switches. (Note that these functions are currently not called in this version of the firmware, however an attacker could use other vulnerabilities to finally use these vulnerabilities to gain code execution.)

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-wgw9-xjmw-x98v

больше 3 лет назад

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the firmware, an attacker could leverage these functions to call system() and execute arbitrary commands on the switches. (Note that these functions are currently not called in this version of the firmware, however an attacker could use other vulnerabilities to finally use these vulnerabilities to gain code execution.)

EPSS: Низкий
fstec логотип

BDU:2019-04686

около 6 лет назад

Уязвимость функций cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), cmd_sys_ping_exec() библиотеки libclicmd.so микропрограммного обеспечения маршрутизаторов Zyxel серии GS1900, позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-15800

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the firmware, an attacker could leverage these functions to call system() and execute arbitrary commands on the switches. (Note that these functions are currently not called in this version of the firmware, however an attacker could use other vulnerabilities to finally use these vulnerabilities to gain code execution.)

CVSS3: 9.8
3%
Низкий
около 6 лет назад
github логотип
GHSA-wgw9-xjmw-x98v

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the firmware, an attacker could leverage these functions to call system() and execute arbitrary commands on the switches. (Note that these functions are currently not called in this version of the firmware, however an attacker could use other vulnerabilities to finally use these vulnerabilities to gain code execution.)

3%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-04686

Уязвимость функций cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), cmd_sys_ping_exec() библиотеки libclicmd.so микропрограммного обеспечения маршрутизаторов Zyxel серии GS1900, позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.8
3%
Низкий
около 6 лет назад

Уязвимостей на страницу