Description
A command injection (missing input validation, escaping) in the ftp upgrade configuration interface on the Auerswald COMfort 1200 IP phone 3.4.4.1-10589 allows an authenticated remote attacker (simple user) -- in the same network as the device -- to trigger OS commands (like starting telnetd or opening a reverse shell) via a POST request to the web server.
Published: 2019-05-29
Score: 8.0 High
EPSS: 2.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-11644 A command injection (missing input validation, escaping) in the ftp upgrade configuration interface on the Auerswald COMfort 1200 IP phone 3.4.4.1-10589 allows an authenticated remote attacker (simple user) -- in the same network as the device -- to trigger OS commands (like starting telnetd or opening a reverse shell) via a POST request to the web server.
History

No history.

Subscriptions

Auerswald Comfortel 1200 Ip Comfortel 1200 Ip Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:51:17.879Z

Reserved: 2018-12-08T00:00:00.000Z

Link: CVE-2018-19977

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-05-29T18:29:00.897

Modified: 2024-11-21T03:58:55.653

Link: CVE-2018-19977

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses