CCRX has a Path Traversal vulnerability. Path Traversal is an attack on web applications. By manipulating the value of the file path, an attacker can gain access to the file system, including source code and critical system settings.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
* Auto WordPress Plugins Update [Sun Oct 1 04:12:23 UTC 2023] 🤖
* Create CVE-2023-43261.yaml
A critical security vulnerability has been identified in Milesight Industrial Cellular Routers, compromising the security of sensitive credentials and permitting unauthorized access. This vulnerability stems from a misconfiguration that results in directory listing being enabled on the router systems, rendering log files publicly accessible. These log files, while containing sensitive information such as admin and other user passwords (encrypted as a security measure), can be exploited by attackers via the router's web interface. The presence of a hardcoded AES secret key and initialization vector (IV) in the JavaScript code further exacerbates the situation, facilitating the decryption of these passwords. This chain of vulnerabilities allows malicious actors to gain unauthorized access to the router.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
* Revert "Auto WordPress Plugins Update [Sun Oct 1 04:12:23 UTC 2023] 🤖"
This reverts commit ceb38c80b0.
* added metadata
---------
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
Co-authored-by: GitHub Action <action@github.com>
Co-authored-by: Dhiyaneshwaran <leedhiyanesh@gmail.com>
A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>
TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setting/setTracerouteCfg. This vulnerability allows an attacker to execute arbitrary commands through the "command" parameter.
Signed-off-by: GwanYeong Kim <gy741.kim@gmail.com>