Description
An issue was discovered in the OpenWebif plugin through 1.2.4 for E2 open devices. The saveConfig function of "plugin/controllers/models/config.py" performs an eval() call on the contents of the "key" HTTP GET parameter. This allows an unauthenticated remote attacker to execute arbitrary Python code or OS commands via api/saveconfig.
Published: 2017-06-22
Score: 9.8 Critical
EPSS: 14.0% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Openwebif Project Openwebif
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T17:18:01.914Z

Reserved: 2017-06-21T00:00:00.000Z

Link: CVE-2017-9807

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-06-22T03:29:00.207

Modified: 2026-05-13T00:24:29.033

Link: CVE-2017-9807

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses