Impact
Authenticated users can inject arbitrary operating system commands via the DATE parameter in /cgi-bin/logs_ids.cgi. The application concatenates the parameter into a file path that is passed to a Perl open() call. A poorly constructed regular expression fails to filter malicious input, allowing the attacker to execute commands with the privileges of the web service. This results in full control of the affected firewall instance, compromising network security and device integrity.
Affected Systems
Boards running Endian Firewall version 3.3.25 and older, including the 2.1.2, 2.4, and 3.3.25 releases, are impacted by the vulnerability in the logs_ids.cgi script. Any administrator or authenticated user of these releases can exploit the flaw.
Risk and Exploitability
The vulnerability receives a CVSS score of 8.7, indicating high severity. No EPSS score is published, and the flaw is not catalogued in CISA’s KEV list, yet the prerequisite of an authenticated session is common in managed firewall environments, making exploitation realistic. Attackers can craft a DATE value that injects shell commands, causing the web service to execute them with full host privileges.
OpenCVE Enrichment