Description
Cayin Signage Media Player 3.0 contains an authenticated remote command injection vulnerability in system.cgi and wizard_system.cgi pages. Attackers can exploit the 'NTP_Server_IP' parameter with default credentials to execute arbitrary shell commands as root.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
1.0 Build 14246
1.0 Build 14199
1.0 Build 14167
1.0 Build 14097
1.0 Build 14090
1.0 Build 14069
1.0 Build 14062
1.0 Build 14092
1.0 Build 14087
3.0 Build 19025
3.0
1.0 Build 14087
2.0 Build 11175
1.5 Build 11476
1.5 Build 11126
1.0 Build 10301
1.0 Build 12331
Credits
LiquidWorm as Gjoko Krstic of Zero Science Lab
References
www.exploit-db.com/exploits/48557 (ExploitDB-48557)
www.cayintech.com (Cayin Technology Official Website)
www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5569.php (Zero Science Lab Disclosure (ZSL-2020-5569))
packetstorm.news/files/id/157942 (Packet Storm Security Exploit Entry)
exchange.xforce.ibmcloud.com/vulnerabilities/182924 (IBM X-Force Vulnerability Exchange)
cxsecurity.com/issue/WLB-2020060049 (CXSecurity Vulnerability Listing)
www.vulncheck.com/...ote-command-injection-via-ntp-parameter (VulnCheck Advisory: Cayin Signage Media Player 3.0 Authenticated Remote Command Injection via NTP Parameter)