CVE-2018-15477

myStrom WiFi Switch V1 devices before 2.66 did not sanitize a parameter received from the cloud that was used in an OS command. Malicious servers were able to run operating system commands on the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:mystrom:wifi_switch_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mystrom:wifi_switch:v1:*:*:*:*:*:*:*

History

21 Nov 2024, 03:50

Type Values Removed Values Added
References () https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2018-15476ff.txt - Third Party Advisory () https://www.swisscom.ch/content/dam/swisscom/de/about/nachhaltigkeit/digitale-schweiz/sicherheit/bug-bounty/files/cve-2018-15476ff.txt - Third Party Advisory

Information

Published : 2018-08-30 17:29

Updated : 2024-11-21 03:50


NVD link : CVE-2018-15477

Mitre link : CVE-2018-15477

CVE.ORG link : CVE-2018-15477


JSON object : View

Products Affected

mystrom

  • wifi_switch
  • wifi_switch_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')