An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
http://www.gestioip.net/index.html | product |
https://github.com/muebel/gestioip-docker-compose | product |
https://github.com/maxibelino/CVEs/tree/main/CVE-2024-48760 | exploit third party advisory |