Network Attached Storage on LG N1T1*** 10124 devices allows an unauthenticated attacker to gain root access via OS command injection in the en/ajp/plugins/access.ssh/checkInstall.php destServer parameter.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.lg.com/uk/support/product/lg-N1T1DD1 | product vendor advisory |
https://www.lg.com/us/burners-drives/lg-N1T1-network-attached-storage | product vendor advisory |
https://zerosecuritypenetrationtesting.com/?page_id=306 | url repurposed exploit third party advisory |