Gocloud S2A_WL 4.2.7.16471, S2A 4.2.7.17278, S2A 4.3.0.15815, S2A 4.3.0.17193, S3A K2P MTK 4.2.7.16528, S3A 4.3.0.16572, and ISP3000 4.3.0.17190 devices allows remote attackers to execute arbitrary OS commands via shell metacharacters in a ping operation, as demonstrated by the cgi-bin/webui/admin/tools/app_ping/diag_ping/; substring.

Project Subscriptions

Vendors Products
Gocloud Subscribe
Isp3000 Subscribe
Isp3000 Firmware Subscribe
S2a Firmware Subscribe
S2a Wl Firmware Subscribe
S3a Firmware Subscribe
S3a K2p Mtk Subscribe
S3a K2p Mtk Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-29779 Gocloud S2A_WL 4.2.7.16471, S2A 4.2.7.17278, S2A 4.3.0.15815, S2A 4.3.0.17193, S3A K2P MTK 4.2.7.16528, S3A 4.3.0.16572, and ISP3000 4.3.0.17190 devices allows remote attackers to execute arbitrary OS commands via shell metacharacters in a ping operation, as demonstrated by the cgi-bin/webui/admin/tools/app_ping/diag_ping/; substring.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T10:12:11.054Z

Reserved: 2020-02-12T00:00:00

Link: CVE-2020-8949

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-02-12T19:15:14.217

Modified: 2024-11-21T05:39:43.493

Link: CVE-2020-8949

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses