← Retour aux CVEs
CVE-2017-18378
N/ADescription
In NETGEAR ReadyNAS Surveillance before 1.4.3-17 x86 and before 1.1.4-7 ARM, $_GET['uploaddir'] is not escaped and is passed to system() through $tmp_upload_dir, leading to upgrade_handle.php?cmd=writeuploaddir remote command execution.
Details CVE
Score CVSS v3.1N/A
Publie6/11/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
netgear:readynas_surveillancenetgear:readynas_surveillance_firmware
Faiblesses (CWE)
CWE-77
References
https://kb.netgear.com/000049072/Security-Advisory-for-Command-Injection-in-ReadyNAS-Surveillance-Application-PSV-2017-2653(cve@mitre.org)
https://www.exploit-db.com/exploits/42956(cve@mitre.org)
https://kb.netgear.com/000049072/Security-Advisory-for-Command-Injection-in-ReadyNAS-Surveillance-Application-PSV-2017-2653(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/42956(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.