The web administrative portal in Zhone zNID GPON 2426A before S3.0.501 allows remote attackers to execute arbitrary commands via shell metacharacters in the ipAddr parameter to zhnping.cmd.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2015/Oct/57 | mailing list exploit third party advisory |
https://www.exploit-db.com/exploits/38453/ | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/133921/Zhone-Insecure-Reference-Password-Disclosure-Command-Injection.html | exploit vdb entry third party advisory |
http://www.securityfocus.com/archive/1/536663/100/0/threaded | mailing list |