Posts Tagged ‘command’

Solarwinds LEM 6.3.1 Shell Escape Command Injection

Insufficient input validation in the management interface can be leveraged in order to execute arbitrary commands. This can lead to (root) shell access to the underlying operating system on Solarwinds Log and Event Manager Virtual Appliance version 6.3.1. Source: Solarwinds LEM 6.3.1 Shell Escape Command Injection


WePresent WiPG-1000 Command Injection

This Metasploit module exploits a command injection vulnerability in an undocumented CGI file in several versions of the WePresent WiPG-1000 devices. Version 2.0.0.7 was confirmed vulnerable, 2.2.3.0 patched this vulnerability. Source: WePresent WiPG-1000 Command Injection


Huawei HG532n Command Injection

This Metasploit module exploits a command injection vulnerability in the Huawei HG532n routers provided by TE-Data Egypt, leading to a root shell. The router’s web interface has two kinds of logins, a “limited” user:user login given to all customers and an admin mode. The limited mode is used here to expose the router’s telnet port […]


AlienVault USM/OSSIM 5.3.4 / 5.3.5 Remote Command Execution

This Metasploit module exploits an unauthenticated command injection in Alienvault USM/OSSIM versions 5.3.4 and 5.3.5. The vulnerability lies in an API function that does not check for authentication and then passes user input directly to a system call as root. Source: AlienVault USM/OSSIM 5.3.4 / 5.3.5 Remote Command Execution


Logsign Remote Command Injection

This Metasploit module exploits an command injection vulnerability in Logsign. By exploiting this vulnerability, unauthenticated users can execute arbitrary code under the root user. Logsign has a publicly accessible endpoint. That endpoint takes a user input and then use it during operating system command execution without proper validation. This Metasploit module was tested against 4.4.2 […]