Description
An issue was discovered on Systrome Cumilon ISG-600C, ISG-600H, and ISG-800W devices with firmware V1.1-R2.1_TRUNK-20181105.bin. A shell command injection occurs by editing the description of an ISP file. The file network/isp/isp_update_edit.php does not properly validate user input, which leads to shell command injection via the des parameter.
Published: 2019-03-17
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-16925 An issue was discovered on Systrome Cumilon ISG-600C, ISG-600H, and ISG-800W devices with firmware V1.1-R2.1_TRUNK-20181105.bin. A shell command injection occurs by editing the description of an ISP file. The file network/isp/isp_update_edit.php does not properly validate user input, which leads to shell command injection via the des parameter.
History

No history.

Subscriptions

Systrome Cumilon Isg-600c Cumilon Isg-600c Firmware Cumilon Isg-600h Cumilon Isg-600h Firmware Cumilon Isg-800w Cumilon Isg-800w Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T20:46:46.242Z

Reserved: 2019-02-04T00:00:00.000Z

Link: CVE-2019-7383

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-21T16:01:11.610

Modified: 2024-11-21T04:48:06.723

Link: CVE-2019-7383

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses