An unrestricted file upload vulnerability in importuser.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data to a specified filename. This can be used to place attacker controlled code on the file system that is then executed.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://www.purehacking.com/blog/matthew-fulton/back-to-the-future-asustor-web-exploitation | third party advisory exploit |
https://github.com/mefulton/asustorexploit | third party advisory exploit |
http://seclists.org/fulldisclosure/2018/May/2 | mailing list third party advisory exploit |