CVE-2017-12945

Insufficient validation of user-supplied input for the Solstice Pod before 2.8.4 networking configuration enables authenticated attackers to execute arbitrary commands as root.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:mersive:solstice_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mersive:solstice:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:10

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/155494/Mersive-Solstice-2.8.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/155494/Mersive-Solstice-2.8.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://documentation.mersive.com/content/pages/release-notes.htm - Release Notes, Vendor Advisory () https://documentation.mersive.com/content/pages/release-notes.htm - Release Notes, Vendor Advisory
References () https://github.com/aress31/cve-2017-12945 - Exploit, Third Party Advisory () https://github.com/aress31/cve-2017-12945 - Exploit, Third Party Advisory
References () https://www.exploit-db.com/exploits/47722 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/47722 - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2019-11-27 16:15

Updated : 2024-11-21 03:10


NVD link : CVE-2017-12945

Mitre link : CVE-2017-12945

CVE.ORG link : CVE-2017-12945


JSON object : View

Products Affected

mersive

  • solstice
  • solstice_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')