The ping page of the administration panel in Telmat AccessLog <= 6.0 (TAL_20180415) allows an attacker to get root shell access via authenticated code injection over the network.
References
Link | Resource |
---|---|
https://podalirius.net/cves/2020-16148/ | Exploit Third Party Advisory |
https://podalirius.net/en/cves/2020-16148/ | Exploit Third Party Advisory |
https://podalirius.net/cves/2020-16148/ | Exploit Third Party Advisory |
https://podalirius.net/en/cves/2020-16148/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 05:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://podalirius.net/cves/2020-16148/ - Exploit, Third Party Advisory | |
References | () https://podalirius.net/en/cves/2020-16148/ - Exploit, Third Party Advisory |
Information
Published : 2020-09-24 14:15
Updated : 2024-11-21 05:06
NVD link : CVE-2020-16148
Mitre link : CVE-2020-16148
CVE.ORG link : CVE-2020-16148
JSON object : View
Products Affected
telmat
- accesslog
- git\@box_firmware
- accesslog_firmware
- educ\@box
- educ\@box_firmware
- git\@box
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')