The web server of Hirschmann BAT-C2 before 09.13.01.00R04 allows authenticated command injection. This allows an authenticated attacker to pass commands to the shell of the system because the dir parameter of the FsCreateDir Ajax function is not sufficiently sanitized. The vendor's ID is BSECV-2022-21.
References
Link | Resource |
---|---|
https://www.belden.com/support/security-assurance | Broken Link |
http://seclists.org/fulldisclosure/2022/Nov/19 | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/170063/Hirschmann-Belden-BAT-C2-8.8.1.0R8-Command-Injection.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-11-24 21:15
Updated : 2022-12-01 05:45
NVD link : CVE-2022-40282
Mitre link : CVE-2022-40282
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
belden
- hirschmann_bat-c2_firmware
- hirschmann_bat-c2