The HTTP web-management application on Edgewater Networks Edgemarc appliances has a hidden page that allows for user-defined commands such as specific iptables routes, etc., to be set. You can use this page as a web shell essentially to execute commands, though you get no feedback client-side from the web application: if the command is valid, it executes. An example is the wget command. The page that allows this has been confirmed in firmware as old as 2006.
References
Link | Resource |
---|---|
https://depthsecurity.com/blog/cve-2017-6079-blind-command-injection-in-edgewater-edgemarc-devices | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2017-05-16 17:29
Updated : 2024-02-28 15:44
NVD link : CVE-2017-6079
Mitre link : CVE-2017-6079
CVE.ORG link : CVE-2017-6079
JSON object : View
Products Affected
ribboncommunications
- edgemarc_4750
- edgemarc_4800
- edgemarc_firmware
- edgemarc_7301
- edgemarc_4550
- edgemarc_7400
- edgemarc_4552
- edgemarc_4700
- edgemarc_4808
- edgemarc_4806
- edgemarc_4601
CWE