Impact
The vulnerability allows an authenticated user to inject and execute arbitrary operating system commands through the DATE parameter of /cgi-bin/logs_clamav.cgi. Because the parameter is incorporated into a file path that is passed to a Perl open() call without proper validation, it permits exploitation of CWE-78. A successful payload grants full control of the underlying host, enabling data theft, modification, or destruction.
Affected Systems
The flaw exists in Endian Firewall installations up to version 3.3.25, including the 2.1.2 and 2.4 release lines. Any system running these versions and allowing authenticated Web UI access to the logs_clamav CGI script is vulnerable.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity, and while EPSS data is not available, the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires local or web admin credentials; an attacker can craft a request to the CGI script with a malicious DATE value, triggering command execution on the host.
OpenCVE Enrichment