An issue in BL-AC2100 <=V1.0.4 allows a remote attacker to execute arbitrary code via the time1 and time2 parameters in the set_LimitClient_cfg of the goahead webservice.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
https://www.yuque.com/jichujiliangdanwei/vwbq9e/ux1426h170rhgfn7 | third party advisory exploit |
https://www.yuque.com/jichujiliangdanwei/vwbq9e/grfgkm2kvk6btwbp | third party advisory exploit |