CVE-2014-9727

AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm.
Configurations

Configuration 1 (hide)

cpe:2.3:a:avm:fritz\!box:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:23

Type Values Removed Values Added
References
  • {'url': 'https://www.trustwave.com/Resources/SpiderLabs-Blog/-Honeypot-Alert--Fritz!Box-%E2%80%93-Remote-Command-Execution-Exploit-Attempt/', 'name': 'https://www.trustwave.com/Resources/SpiderLabs-Blog/-Honeypot-Alert--Fritz!Box-%E2%80%93-Remote-Command-Execution-Exploit-Attempt/', 'tags': [], 'refsource': 'MISC'}
  • () https://www.trustwave.com/Resources/SpiderLabs-Blog/-Honeypot-Alert--Fritz%21Box-%E2%80%93-Remote-Command-Execution-Exploit-Attempt/ -

Information

Published : 2015-05-29 15:59

Updated : 2024-02-28 15:21


NVD link : CVE-2014-9727

Mitre link : CVE-2014-9727

CVE.ORG link : CVE-2014-9727


JSON object : View

Products Affected

avm

  • fritz\!box
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')