cgi-bin/mft/wireless_mft.cgi in AirLive BU-2015 with firmware 1.03.18 16.06.2014, AirLive BU-3026 with firmware 1.43 21.08.2014, AirLive MD-3025 with firmware 1.81 21.08.2014, AirLive WL-2000CAM with firmware LM.1.6.18 14.10.2011, and AirLive POE-200CAM v2 with firmware LM.1.6.17.01 uses hard-coded credentials in the embedded Boa web server, which allows remote attackers to obtain user credentials via crafted HTTP requests.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/535938/100/0/threaded | mailing list |
http://packetstormsecurity.com/files/132585/AirLive-Remote-Command-Injection.html | mitigation exploit vdb entry third party advisory |
http://seclists.org/fulldisclosure/2015/Jul/29 | mailing list mitigation exploit third party advisory |
http://www.securityfocus.com/bid/75559 | mitigation exploit vdb entry third party advisory |
https://www.coresecurity.com/advisories/airlive-multiple-products-os-command-injection | mitigation exploit third party advisory technical description |