Description
The web server on DBL DBLTek devices allows remote attackers to execute arbitrary OS commands by obtaining the admin password via a frame.html?content=/dev/mtdblock/5 request, and then using this password for the HTTP Basic Authentication needed for a change_password.csp request, which supports a "<%%25call system.exec:" string in the passwd parameter.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://blogs.securiteam.com/index.php/archives/3437 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:43:57.725Z
Reserved: 2017-11-24T00:00:00.000Z
Link: CVE-2017-16934
No data.
Status : Modified
Published: 2017-11-24T07:29:00.240
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-16934
No data.
OpenCVE Enrichment
No data.
Weaknesses