CVE-2023-26802
https://notcve.org/view.php?id=CVE-2023-26802
An issue in the component /network_config/nsg_masq.cgi of DCN (Digital China Networks) DCBI-Netlog-LAB v1.0 allows attackers to bypass authentication and execute arbitrary commands via a crafted request. • https://github.com/winmt/my-vuls/tree/main/DCN%20DCBI-Netlog-LAB • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2021-42324
https://notcve.org/view.php?id=CVE-2021-42324
An issue was discovered on DCN (Digital China Networks) S4600-10P-SI devices before R0241.0470. Due to improper parameter validation in the console interface, it is possible for a low-privileged authenticated attacker to escape the sandbox environment and execute system commands as root via shell metacharacters in the capture command parameters. Command output will be shown on the Serial interface of the device. Exploitation requires both credentials and physical access. Se ha detectado un problema en los dispositivos DCN (Digital China Networks) S4600-10P-SI versiones anteriores a R0241.0470. • https://exatel.pl/cve-2021-42324-metacharacter-injection-w-przelacznikach-dcn-s4600-10p-si https://www.dcneurope.eu/products/switches/s4600-10p-si • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2022-25390
https://notcve.org/view.php?id=CVE-2022-25390
DCN Firewall DCME-520 was discovered to contain a remote command execution (RCE) vulnerability via the host parameter in the file /system/tool/ping.php. Se ha detectado que DCN Firewall DCME-520 contiene una vulnerabilidad de ejecución de comandos remota (RCE) por medio del parámetro host en el archivo /system/tool/ping.php • https://www.adminxe.com/3276.html •
CVE-2022-25389
https://notcve.org/view.php?id=CVE-2022-25389
DCN Firewall DCME-520 was discovered to contain an arbitrary file download vulnerability via the path parameter in the file /audit/log/log_management.php. Se ha detectado que DCN Firewall DCME-520 contenía una vulnerabilidad de descarga de archivos arbitrarios por medio del parámetro path en el archivo /audit/log/log_management.php • https://www.adminxe.com/3246.html •