Логотип exploitDog
bind:CVE-2019-25289
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-25289

Количество 2

Количество 2

nvd логотип

CVE-2019-25289

около 1 месяца назад

SmartLiving SmartLAN <=6.x contains an authenticated remote command injection vulnerability in the web.cgi binary through the 'par' POST parameter with the 'testemail' module. Attackers can exploit the unsanitized parameter and system() function call to execute arbitrary system commands with root privileges using default credentials.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-5qp9-vfg2-vf44

около 1 месяца назад

SmartLiving SmartLAN <=6.x contains an authenticated remote command injection vulnerability in the web.cgi binary through the 'par' POST parameter with the 'testemail' module. Attackers can exploit the unsanitized parameter and system() function call to execute arbitrary system commands with root privileges using default credentials.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-25289

SmartLiving SmartLAN <=6.x contains an authenticated remote command injection vulnerability in the web.cgi binary through the 'par' POST parameter with the 'testemail' module. Attackers can exploit the unsanitized parameter and system() function call to execute arbitrary system commands with root privileges using default credentials.

CVSS3: 8.8
0%
Низкий
около 1 месяца назад
github логотип
GHSA-5qp9-vfg2-vf44

SmartLiving SmartLAN <=6.x contains an authenticated remote command injection vulnerability in the web.cgi binary through the 'par' POST parameter with the 'testemail' module. Attackers can exploit the unsanitized parameter and system() function call to execute arbitrary system commands with root privileges using default credentials.

CVSS3: 8.8
0%
Низкий
около 1 месяца назад

Уязвимостей на страницу