A remote code execution vulnerability is identified in FruityWifi through 2.4. Due to improperly escaped shell metacharacters obtained from the POST request at the page_config_adv.php page, it is possible to perform remote code execution by an authenticated attacker. This is similar to CVE-2018-17317.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://fruitywifi.com/index_eng.html | vendor advisory |
https://github.com/xtr4nge/FruityWifi | third party advisory |
https://gist.github.com/harsh-bothra/f899045b16bbba264628d79d52c07c22 | third party advisory exploit |