The Billion 5200W-T 1.02b.rc5.dt49 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the adv_remotelog.asp page and can be exploited through the syslogServerAddr parameter.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://seclists.org/fulldisclosure/2017/Jan/40 | mailing list exploit third party advisory |
https://ssd-disclosure.com/index.php/archives/2910 | exploit third party advisory technical description |
https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt | third party advisory exploit |