ping.cgi in NetCommWireless HSPA 3G10WVE wireless routers with firmware before 3G10WVE-L101-S306ETS-C01_R05 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the DIA_IPADDRESS parameter.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/136901/NetCommWireless-HSPA-3G10WVE-Authentication-Bypass-Code-Execution.html - Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2016/May/13 - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2016/May/18 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/538263/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/538297/100/0/threaded - | |
References | () https://www.exploit-db.com/exploits/39762/ - Third Party Advisory, VDB Entry |
Information
Published : 2017-02-09 15:59
Updated : 2024-11-21 02:34
NVD link : CVE-2015-6024
Mitre link : CVE-2015-6024
CVE.ORG link : CVE-2015-6024
JSON object : View
Products Affected
netcommwireless
- hspa_3g10wve_firmware
- hspa_3g10wve
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')