Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 09 Jul 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Engeniustech
Engeniustech epg5000 Engeniustech epg5000 Firmware Engeniustech esr1200 Engeniustech esr1200 Firmware Engeniustech esr1750 Engeniustech esr1750 Firmware Engeniustech esr300 Engeniustech esr300 Firmware Engeniustech esr350 Engeniustech esr350 Firmware Engeniustech esr600 Engeniustech esr600 Firmware Engeniustech esr900 Engeniustech esr900 Firmware |
|
| CPEs | cpe:2.3:h:engeniustech:epg5000:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr1200:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr1750:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr300:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr350:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr600:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr900:-:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.2.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.3.17:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.7.20:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.9.21:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.3.1.34:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.4.1:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.2.2.27:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.3.1.34:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.1:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.1.0.28:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.3.1.42:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.1.28:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.7:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.9:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.1.0.29:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.3.1.41:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.11:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.9:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.1.0.50:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.2.1.46:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.3.1.63:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.0.23:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.11:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.1:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.9:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.2.2.23:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.3.1.26:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.3.5.18:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.4.5:*:*:*:*:*:*:* |
|
| Vendors & Products |
Engeniustech
Engeniustech epg5000 Engeniustech epg5000 Firmware Engeniustech esr1200 Engeniustech esr1200 Firmware Engeniustech esr1750 Engeniustech esr1750 Firmware Engeniustech esr300 Engeniustech esr300 Firmware Engeniustech esr350 Engeniustech esr350 Firmware Engeniustech esr600 Engeniustech esr600 Firmware Engeniustech esr900 Engeniustech esr900 Firmware |
|
| Metrics |
cvssV3_1
|
Tue, 24 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Jun 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 24 Jun 2025 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 24 Jun 2025 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise. | |
| Title | EnGenius EnShare IoT Gigabit Cloud Service Command Injection | |
| Weaknesses | CWE-20 CWE-78 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-06-24T13:30:48.459Z
Reserved: 2025-04-15T19:15:22.546Z
Link: CVE-2025-34035
Updated: 2025-06-24T13:30:31.491Z
Status : Analyzed
Published: 2025-06-24T01:15:24.763
Modified: 2025-07-09T19:08:56.867
Link: CVE-2025-34035
No data.
OpenCVE Enrichment
No data.