AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm.
References
Configurations
History
21 Nov 2024, 02:21
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.exploit-db.com/exploits/33136 - Exploit | |
References | () http://www.osvdb.org/103289 - | |
References | () https://www.trustwave.com/Resources/SpiderLabs-Blog/-Honeypot-Alert--Fritz%21Box-%E2%80%93-Remote-Command-Execution-Exploit-Attempt/ - |
07 Nov 2023, 02:23
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2015-05-29 15:59
Updated : 2024-11-21 02:21
NVD link : CVE-2014-9727
Mitre link : CVE-2014-9727
CVE.ORG link : CVE-2014-9727
JSON object : View
Products Affected
avm
- fritz\!box
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')