[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Submit #335254: Arris Group Arris VAP2500 AT.08.50 Command Injectioninformação

TitleArris Group Arris VAP2500 AT.08.50 Command Injection
DescriptionThere is a remote command execution vulnerability in the ARRIS-VAP2500 backend,the parameters in the interface /tools_command.php are not verified, causing any command to be executed to obtain server permissions.
Source⚠️ https://github.com/h0e4a0r1t/h0e4a0r1t.github.io/blob/master/2024/a%2B%26%5BE4%3Flp5%3Fk9_%3D%5D/ARRIS_VAP2500-RCE-tools_command.php.pdf
User
 H0e4a0r1t (UID 65358)
Submission15/05/2024 05h40 (há 9 Meses)
Moderation22/05/2024 07h21 (7 days later)
StatusAceite
VulDB Entry265833 [Arris VAP2500 08.50 /tools_command.php cmb_header/txt_command privilege escalation]
Points17

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!