A Remote Code Execution issue in the DNS Query Web UI in Lifesize Icon LS_RM3_3.7.0 (2421) allows remote authenticated attackers to execute arbitrary commands via a crafted DNS Query address field in a JSON API request.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.sva.de/solutions/it-security.html | not applicable |
https://www.lifesize.com/en/video-conferencing-cameras | product vendor advisory |
https://atomic111.github.io/article/lifesize-icon-remote-code-execution | third party advisory exploit |