| |
Vulnerability CVE-2019-6962
Published: 2019-06-20
Description: |
A shell injection issue in cosa_wifi_apis.c in the RDK RDKB-20181217-1 CcspWifiAgent module allows attackers with login credentials to execute arbitrary shell commands under the CcspWifiSsp process (running as root) if the platform was compiled with the ENABLE_FEATURE_MESHWIFI macro. The attack is conducted by changing the Wi-Fi network password to include crafted escape characters. This is related to the WebUI module. |
Type:
CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection'))
CVSS2 => (AV:N/AC:M/Au:S/C:C/I:C/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
8.5/10 |
10/10 |
6.8/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Medium |
Single time |
Confidentiality impact |
Integrity impact |
Availability impact |
Complete |
Complete |
Complete |
References: |
https://dojo.bullguard.com/dojo-by-bullguard/blog/the-gateway-is-wide-open
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|