Description
An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. The login form passes user input directly to a shell command without any kind of escaping or validation in /usr/share/www/check.lp file. An attacker is able to perform command injection using the "password" parameter in the login form.
Published: 2019-03-17
Score: 9.8 Critical
EPSS: 30.7% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Teracue Enc-400 Hdmi Enc-400 Hdmi2 Enc-400 Hdmi2 Firmware Enc-400 Hdmi Firmware Enc-400 Hdsdi Enc-400 Hdsdi Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T11:58:19.100Z

Reserved: 2018-12-19T00:00:00.000Z

Link: CVE-2018-20218

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-21T16:00:35.250

Modified: 2024-11-21T04:01:06.283

Link: CVE-2018-20218

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses