The Crestron AM-100 firmware 1.6.0.2, Crestron AM-101 firmware 2.7.0.1, Barco wePresent WiPG-1000P firmware 2.3.0.10, Barco wePresent WiPG-1600W before firmware 2.4.1.19, Extron ShareLink 200/250 firmware 2.0.3.4, Teq AV IT WIPS710 firmware 1.1.0.7, SHARP PN-L703WA firmware 1.4.2.3, Optoma WPS-Pro firmware 1.0.0.5, Blackbox HD WPS firmware 1.0.0.5, InFocus LiteShow3 firmware 1.0.16, and InFocus LiteShow4 2.0.0.7 are vulnerable to command injection via the file_transfer.cgi HTTP endpoint. A remote, unauthenticated attacker can use this vulnerability to execute operating system commands as root.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/152715/Barco-AWIND-OEM-Presentation-Platform-Unauthenticated-Remote-Command-Injection.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/155948/Barco-WePresent-file_transfer.cgi-Command-Injection.html | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/46786/ | Exploit Third Party Advisory VDB Entry |
https://www.tenable.com/security/research/tra-2019-20 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: tenable
Published: 2019-04-30T20:21:09
Updated: 2020-01-14T17:06:03
Reserved: 2019-01-03T00:00:00
Link: CVE-2019-3929
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-04-30T21:29:00.713
Modified: 2020-10-16T18:09:51.387
Link: CVE-2019-3929
JSON object: View
Redhat Information
No data.