Page 18 of 91 results (0.008 seconds)

CVSS: 9.0EPSS: 1%CPEs: 2EXPL: 1

System command injection vulnerability in wifi_access in Xiaomi Mi Router 3 version 2.22.15 allows attackers to execute system commands via the "timeout" URL parameter. Vulnerabilidad de inyección de comandos del sistema en Xiaomi Mi Router 3 en su versión 2.22.15 permite que los atacantes ejecuten comandos del sistema mediante el parámetro "timeout" de la URL. • https://blog.securityevaluators.com/hack-routers-get-toys-exploiting-the-mi-router-3-1d7fd42f0838 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

Cross-site scripting vulnerability in the API 404 page on Xiaomi Mi Router 3 version 2.22.15 allows attackers to execute arbitrary JavaScript via a modified URL path. Vulnerabilidad Cross-Site Scripting (XSS) en la página API 404 en Xiaomi Mi Router 3 en su versión 2.22.15 permite que los atacantes ejecuten JavaScript arbitrario mediante una ruta URL modificada. • https://blog.securityevaluators.com/hack-routers-get-toys-exploiting-the-mi-router-3-1d7fd42f0838 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

An "Out-of-band resource load" issue was discovered on Xiaomi MIWiFi Xiaomi_55DD Version 2.8.50 devices. It is possible to induce the application to retrieve the contents of an arbitrary external URL and return those contents in its own response. If a domain name (containing a random string) is used in the HTTP Host header, the application performs an HTTP request to the specified domain. The response from that request is then included in the application's own response. Se ha detectado un problema de carga de recursos fuera de banda en dispositivos Xiaomi MIWiFi Xiaomi_55DD 2.8.50. • http://packetstormsecurity.com/files/149196/MIWiFi-Xiaomi_55DD-2.8.50-Out-Of-Band-Resource-Load.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 1

OS command injection in the AP mode settings feature in /cgi-bin/luci /api/misystem/set_router_wifiap on Xiaomi R3D before 2.26.4 devices allows an attacker to execute any command via crafted JSON data. Inyección de comandos del sistema operativo en la característica de opciones del modo AP en /cgi-bin/luci /api/misystem/set_router_wifiap en Xiaomi R3D en versiones anteriores a la 2.26.4 permite que un atacante ejecute cualquier comando mediante datos JSON manipulados. • http://www.cnvd.org.cn/flaw/show/CNVD-2018-04520 https://github.com/cc-crack/router/blob/master/CNVD-2018-04520.py • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: 8EXPL: 1

OS command injection in the guest Wi-Fi settings feature in /cgi-bin/luci on Xiaomi R3P before 2.14.5, R3C before 2.12.15, R3 before 2.22.15, and R3D before 2.26.4 devices allows an attacker to execute any command via crafted JSON data. Inyección de comandos del sistema operativo en la característica de opciones Wi-Fi de invitado en /cgi-bin/luci en Xiaomi R3P en versiones anteriores a la 2.14.5, R3C en versiones anteriores a la 2.12.15, R3 en versiones anteriores a la 2.22.15 y R3D en versiones anteriores a la 2.26.4 permite que un atacante ejecute cualquier comando mediante datos JSON manipulados. • http://www.cnvd.org.cn/flaw/show/CNVD-2018-04521 https://github.com/cc-crack/router/blob/master/CNVD-2018-04521.py • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •