1 results (0.019 seconds)

CVSS: 9.8EPSS: 2%CPEs: 3EXPL: 1

In NETGEAR ReadyNAS Surveillance before 1.4.3-17 x86 and before 1.1.4-7 ARM, $_GET['uploaddir'] is not escaped and is passed to system() through $tmp_upload_dir, leading to upgrade_handle.php?cmd=writeuploaddir remote command execution. En NETGEAR ReadyNAS Surveillance anterior de 1.4.3-17 x86 y anterior de 1.1.4-7 ARM, $ _GET ['uploaddir'] no se escapa y se pasa al sistema () a través de $ tmp_upload_dir, lo que lleva a upgrade_handle.php? Cmd = writeuploaddir Ejecución remota de comandos. • https://kb.netgear.com/000049072/Security-Advisory-for-Command-Injection-in-ReadyNAS-Surveillance-Application-PSV-2017-2653 https://www.exploit-db.com/exploits/42956 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •