CVE-2018-4021

An exploitable command injection vulnerability exists in the way Netgate pfSense CE 2.4.4-RELEASE processes the parameters of a specific POST request. The attacker can exploit this and gain the ability to execute arbitrary commands on the system. An attacker needs to be able to send authenticated POST requests to the administration web interface. Command injection is possible in the `powerd_battery_mode` POST parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:netgate:pfsense:2.4.4:*:*:*:*:*:*:*

History

21 Nov 2024, 04:06

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690 - Exploit, Third Party Advisory () https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690 - Exploit, Third Party Advisory

Information

Published : 2018-12-03 22:29

Updated : 2024-11-21 04:06


NVD link : CVE-2018-4021

Mitre link : CVE-2018-4021

CVE.ORG link : CVE-2018-4021


JSON object : View

Products Affected

netgate

  • pfsense
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')