CVE-2017-11588

On Cisco DDR2200 ADSL2+ Residential Gateway DDR2200B-NA-AnnexA-FCC-V00.00.03.45.4E and DDR2201v1 ADSL2+ Residential Gateway DDR2201v1-NA-AnnexA-FCC-V00.00.03.28.3 devices, there is remote command execution via shell metacharacters in the pingAddr parameter to the waitPingqry.cgi URI. The command output is visible at /PingMsg.cmd.
References
Link Resource
http://seclists.org/fulldisclosure/2017/Jul/26 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/99963 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:cisco:residential_gateway_firmware:ddr2200b-na-annexa-fcc-v00.00.03.45.4e:*:*:*:*:*:*:*
cpe:2.3:o:cisco:residential_gateway_firmware:ddr2201v1-na-annexa-fcc-v00.00.03.28.3:*:*:*:*:*:*:*
cpe:2.3:h:cisco:residential_gateway:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-07-24 00:29

Updated : 2024-02-28 16:04


NVD link : CVE-2017-11588

Mitre link : CVE-2017-11588

CVE.ORG link : CVE-2017-11588


JSON object : View

Products Affected

cisco

  • residential_gateway
  • residential_gateway_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')