A vulnerability classified as problematic was found in Chengdu VEC40G 3.0. Affected by this vulnerability is an unknown functionality of the file /send_order.cgi?parameter=restart. The manipulation of the argument restart with the input reboot leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-231229 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
The product does not release or incorrectly releases a resource before it is made available for re-use.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
https://vuldb.com/?id.231229 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.231229 | signature third party advisory permissions required |
https://github.com/shulao2020/cve/blob/main/Flying%20Fish.md | third party advisory exploit |