In ProLink PRC2402M V1.0.18 and older, the set_ledonoff function in the adm.cgi binary, accessible with a page parameter value of ledonoff contains a trivial command injection where the value of the led_cmd parameter is passed directly to do_system.
References
Link | Resource |
---|---|
https://www.ayrx.me/prolink-prc2402m-multiple-vulnerabilities/#ledonoff-command-injection | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-08-06T13:19:30
Updated: 2021-08-06T13:19:30
Reserved: 2021-07-12T00:00:00
Link: CVE-2021-36707
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-08-06T14:15:07.877
Modified: 2021-08-12T23:03:15.557
Link: CVE-2021-36707
JSON object: View
Redhat Information
No data.
CWE