An exploitable command injection vulnerability exists in the way Netgate pfSense CE 2.4.4-RELEASE processes the parameters of a specific POST request. The attacker can exploit this and gain the ability to execute arbitrary commands on the system. An attacker needs to be able to send authenticated POST requests to the administration web interface. Command injection is possible in the `powerd_normal_mode` parameter.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690 | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-12-03 14:29
Updated : 2022-06-07 10:22
NVD link : CVE-2018-4019
Mitre link : CVE-2018-4019
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
netgate
- pfsense