Логотип exploitDog
bind:CVE-2020-24849
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-24849

Количество 2

Количество 2

nvd логотип

CVE-2020-24849

больше 5 лет назад

A remote code execution vulnerability is identified in FruityWifi through 2.4. Due to improperly escaped shell metacharacters obtained from the POST request at the page_config_adv.php page, it is possible to perform remote code execution by an authenticated attacker. This is similar to CVE-2018-17317.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-37xx-h5fj-hm7p

больше 3 лет назад

A remote code execution vulnerability is identified in FruityWifi through 2.4. Due to improperly escaped shell metacharacters obtained from the POST request at the page_config_adv.php page, it is possible to perform remote code execution by an authenticated attacker. This is similar to CVE-2018-17317.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-24849

A remote code execution vulnerability is identified in FruityWifi through 2.4. Due to improperly escaped shell metacharacters obtained from the POST request at the page_config_adv.php page, it is possible to perform remote code execution by an authenticated attacker. This is similar to CVE-2018-17317.

CVSS3: 8.8
5%
Низкий
больше 5 лет назад
github логотип
GHSA-37xx-h5fj-hm7p

A remote code execution vulnerability is identified in FruityWifi through 2.4. Due to improperly escaped shell metacharacters obtained from the POST request at the page_config_adv.php page, it is possible to perform remote code execution by an authenticated attacker. This is similar to CVE-2018-17317.

5%
Низкий
больше 3 лет назад

Уязвимостей на страницу