1 results (0.003 seconds)

CVSS: 9.8EPSS: 96%CPEs: 1EXPL: 9

pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected. pfSense pfBlockerNG versiones hasta 2.1.4_26, permite a atacantes remotos ejecutar comandos arbitrarios del Sistema Operativo como root por medio de metacaracteres de shell en el encabezado HTTP Host. NOTA: la versión 3.x no está afectada • https://www.exploit-db.com/exploits/51032 https://github.com/Laburity/CVE-2022-31814 https://github.com/Chocapikk/CVE-2022-31814 https://github.com/Madliife0/CVE-2022-31814 https://github.com/TheUnknownSoul/CVE-2022-31814 https://github.com/ArunHAtter/CVE-2022-31814 https://github.com/dkstar11q/CVE-2022-31814 http://packetstormsecurity.com/files/168743/pfSense-pfBlockerNG-2.1.4_26-Shell-Upload.html http://packetstormsecurity.com/files/171123/pfBlockerNG-2.1.4_26-Remote-Code-Execution&# • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •