Description
SmartLiving SmartLAN <=6.x contains an authenticated remote command injection vulnerability in the web.cgi binary through the 'par' POST parameter with the 'testemail' module. Attackers can exploit the unsanitized parameter and system() function call to execute arbitrary system commands with root privileges using default credentials.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
505
515
1050
1050/G3
10100L
10100L/G3
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5544.php (Zero Science Lab Vulnerability Advisory)
www.exploit-db.com/exploits/47765 (Exploit Database Entry 47765)
packetstormsecurity.com/files/155616 (Packet Storm Security Exploit File)
cxsecurity.com/issue/WLB-2019120046 (CXSecurity Vulnerability Issue)
exchange.xforce.ibmcloud.com/vulnerabilities/172840 (IBM X-Force Vulnerability Exchange Entry)
www.inim.biz/ (Inim Vendor Homepage)