[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Submit #335254: Arris Group Arris VAP2500 AT.08.50 Command Injectioninfo

TitleArris Group Arris VAP2500 AT.08.50 Command Injection
DescriptionThere is a remote command execution vulnerability in the ARRIS-VAP2500 backend,the parameters in the interface /tools_command.php are not verified, causing any command to be executed to obtain server permissions.
Source⚠️ https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/a%2B%26%5BE4%3Flp5%3Fk9_%3D%5D/ARRIS_VAP2500-RCE-tools_command.php.pdf
User
 H0e4a0r1t (UID 65358)
Submission15.05.2024 05:40 (vor 9 Monaten)
Moderation22.05.2024 07:21 (7 days later)
StatusAkzeptiert
VulDB Entry265833 [Arris VAP2500 08.50 /tools_command.php cmb_header/txt_command privilege escalation]
Points17

Do you know our Splunk app?

Download it now for free!