CVE-2018-6388

iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n devices allow remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ping test arguments on the Diagnostics page.
References
Link Resource
https://blogs.securiteam.com/index.php/archives/3654 Exploit Third Party Advisory
https://blogs.securiteam.com/index.php/archives/3654 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:iball:ib-wra150n_firmware:1.2.6:*:*:*:*:*:*:*
cpe:2.3:h:iball:ib-wra150n:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:10

Type Values Removed Values Added
References () https://blogs.securiteam.com/index.php/archives/3654 - Exploit, Third Party Advisory () https://blogs.securiteam.com/index.php/archives/3654 - Exploit, Third Party Advisory

Information

Published : 2018-01-29 18:29

Updated : 2024-11-21 04:10


NVD link : CVE-2018-6388

Mitre link : CVE-2018-6388

CVE.ORG link : CVE-2018-6388


JSON object : View

Products Affected

iball

  • ib-wra150n
  • ib-wra150n_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')