An issue was discovered on Systrome Cumilon ISG-600C, ISG-600H, and ISG-800W devices with firmware V1.1-R2.1_TRUNK-20181105.bin. A shell command injection occurs by editing the description of an ISP file. The file network/isp/isp_update_edit.php does not properly validate user input, which leads to shell command injection via the des parameter.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/107035 | Third Party Advisory VDB Entry |
| http://seclists.org/fulldisclosure/2019/Feb/32 | Exploit Mailing List Third Party Advisory |
| http://packetstormsecurity.com/files/151648/SYSTORME-ISG-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
| https://www.breakthesec.com/2019/02/cve-2019-7383-remote-code-execution-via.html | Third Party Advisory |
| https://s3curityb3ast.github.io/KSA-Dev-003.md | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Information
Published : 2019-03-21 09:01
Updated : 2023-02-03 11:54
NVD link : CVE-2019-7383
Mitre link : CVE-2019-7383
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
systrome
- cumilon_isg-600c
- cumilon_isg-800w_firmware
- cumilon_isg-600h_firmware
- cumilon_isg-600c_firmware
- cumilon_isg-600h
- cumilon_isg-800w


