← Back to CVEs
CVE-2017-6079
CRITICAL9.8
Description
The HTTP web-management application on Edgewater Networks Edgemarc appliances has a hidden page that allows for user-defined commands such as specific iptables routes, etc., to be set. You can use this page as a web shell essentially to execute commands, though you get no feedback client-side from the web application: if the command is valid, it executes. An example is the wget command. The page that allows this has been confirmed in firmware as old as 2006.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published5/16/2017
Last Modified4/20/2025
Sourcenvd
Honeypot Sightings0
Affected Products
ribboncommunications:edgemarc_4550ribboncommunications:edgemarc_4552ribboncommunications:edgemarc_4601ribboncommunications:edgemarc_4700ribboncommunications:edgemarc_4750ribboncommunications:edgemarc_4800ribboncommunications:edgemarc_4806ribboncommunications:edgemarc_4808ribboncommunications:edgemarc_7301ribboncommunications:edgemarc_7400ribboncommunications:edgemarc_firmware
References
https://depthsecurity.com/blog/cve-2017-6079-blind-command-injection-in-edgewater-edgemarc-devices(cve@mitre.org)
https://depthsecurity.com/blog/cve-2017-6079-blind-command-injection-in-edgewater-edgemarc-devices(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.