An exploitable command injection vulnerability exists in the way Netgate pfSense CE 2.4.4-RELEASE processes the parameters of a specific POST request. The attacker can exploit this and gain the ability to execute arbitrary commands on the system. An attacker needs to be able to send authenticated POST requests to the administration web interface. Command injection is possible in the `powerd_ac_mode` POST parameter parameter.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690 | Exploit Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690 - Exploit, Third Party Advisory |
Information
Published : 2018-12-03 22:29
Updated : 2024-11-21 04:06
NVD link : CVE-2018-4020
Mitre link : CVE-2018-4020
CVE.ORG link : CVE-2018-4020
JSON object : View
Products Affected
netgate
- pfsense
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')