ping.cgi in NetCommWireless HSPA 3G10WVE wireless routers with firmware before 3G10WVE-L101-S306ETS-C01_R05 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the DIA_IPADDRESS parameter.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/39762/ | exploit vdb entry third party advisory |
http://seclists.org/fulldisclosure/2016/May/18 | third party advisory mailing list |
http://packetstormsecurity.com/files/136901/NetCommWireless-HSPA-3G10WVE-Authentication-Bypass-Code-Execution.html | vdb entry third party advisory |
http://www.securityfocus.com/archive/1/538297/100/0/threaded | mailing list |
http://seclists.org/fulldisclosure/2016/May/13 | third party advisory mailing list |
http://www.securityfocus.com/archive/1/538263/100/0/threaded | mailing list |