On Cisco DDR2200 ADSL2+ Residential Gateway DDR2200B-NA-AnnexA-FCC-V00.00.03.45.4E and DDR2201v1 ADSL2+ Residential Gateway DDR2201v1-NA-AnnexA-FCC-V00.00.03.28.3 devices, there is remote command execution via shell metacharacters in the pingAddr parameter to the waitPingqry.cgi URI. The command output is visible at /PingMsg.cmd.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2017/Jul/26 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/99963 | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2017/Jul/26 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/99963 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:08
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2017/Jul/26 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/99963 - Third Party Advisory, VDB Entry |
Information
Published : 2017-07-24 00:29
Updated : 2024-11-21 03:08
NVD link : CVE-2017-11588
Mitre link : CVE-2017-11588
CVE.ORG link : CVE-2017-11588
JSON object : View
Products Affected
cisco
- residential_gateway
- residential_gateway_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')