CVE-2018-5757

An issue was discovered on AudioCodes 450HD IP Phone devices with firmware 3.0.0.535.106. The traceroute and ping functionality, which uses a parameter in a request to command.cgi from the Monitoring page in the web UI, unsafely puts user-alterable data directly into an OS command, leading to Remote Code Execution via shell metacharacters in the query string.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:audiocodes:420hd_ip_phone_firmware:3.0.0.535.106:*:*:*:*:*:*:*
cpe:2.3:h:audiocodes:420hd_ip_phone:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:09

Type Values Removed Values Added
References () https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-5757 - Exploit, Third Party Advisory () https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2018-5757 - Exploit, Third Party Advisory

Information

Published : 2019-04-01 17:29

Updated : 2024-11-21 04:09


NVD link : CVE-2018-5757

Mitre link : CVE-2018-5757

CVE.ORG link : CVE-2018-5757


JSON object : View

Products Affected

audiocodes

  • 420hd_ip_phone
  • 420hd_ip_phone_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')