An issue was discovered on Systrome Cumilon ISG-600C, ISG-600H, and ISG-800W devices with firmware V1.1-R2.1_TRUNK-20181105.bin. A shell command injection occurs by editing the description of an ISP file. The file network/isp/isp_update_edit.php does not properly validate user input, which leads to shell command injection via the des parameter.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107035 | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2019/Feb/32 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/151648/SYSTORME-ISG-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
https://www.breakthesec.com/2019/02/cve-2019-7383-remote-code-execution-via.html | Third Party Advisory |
https://s3curityb3ast.github.io/KSA-Dev-003.md | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2019-03-21 09:01
Updated : 2023-02-03 11:54
NVD link : CVE-2019-7383
Mitre link : CVE-2019-7383
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
systrome
- cumilon_isg-600c
- cumilon_isg-800w_firmware
- cumilon_isg-600h_firmware
- cumilon_isg-600c_firmware
- cumilon_isg-600h
- cumilon_isg-800w