The diagnostic-ping implementation on ZyXEL PMG5318-B20A devices with firmware before 1.00(AANC.2)C0 allows remote attackers to execute arbitrary commands via the PingIPAddr parameter.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1034553 | |
https://www.exploit-db.com/exploits/38455/ | |
https://www.kb.cert.org/vuls/id/870744 | US Government Resource |
https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R | US Government Resource |
http://www.securitytracker.com/id/1034553 | |
https://www.exploit-db.com/exploits/38455/ | |
https://www.kb.cert.org/vuls/id/870744 | US Government Resource |
https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R | US Government Resource |
Configurations
History
21 Nov 2024, 02:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securitytracker.com/id/1034553 - | |
References | () https://www.exploit-db.com/exploits/38455/ - | |
References | () https://www.kb.cert.org/vuls/id/870744 - US Government Resource | |
References | () https://www.kb.cert.org/vuls/id/BLUU-9ZQU2R - US Government Resource |
Information
Published : 2015-12-31 05:59
Updated : 2024-11-21 02:34
NVD link : CVE-2015-6018
Mitre link : CVE-2015-6018
CVE.ORG link : CVE-2015-6018
JSON object : View
Products Affected
zyxel
- pmg5318-b20a_firmware
CWE
CWE-264
Permissions, Privileges, and Access Controls