CVE-2019-14259

On the Polycom Obihai Obi1022 VoIP phone with firmware 5.1.11, a command injection (missing input validation) issue in the NTP server IP address field for the "Time Service Settings web" interface allows an authenticated remote attacker in the same network to trigger OS commands via shell commands in a POST request.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:polycom:obihai_obi1022_firmware:5.1.11:*:*:*:*:*:*:*
cpe:2.3:h:polycom:obihai_obi1022:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:26

Type Values Removed Values Added
References () https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Obihai_Obi1002.pdf?_=1563787869 - Exploit, Third Party Advisory () https://www.sit.fraunhofer.de/fileadmin/dokumente/CVE/Advisory_Obihai_Obi1002.pdf?_=1563787869 - Exploit, Third Party Advisory

Information

Published : 2019-08-01 15:15

Updated : 2024-11-21 04:26


NVD link : CVE-2019-14259

Mitre link : CVE-2019-14259

CVE.ORG link : CVE-2019-14259


JSON object : View

Products Affected

polycom

  • obihai_obi1022_firmware
  • obihai_obi1022
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')