Description
TG8 Firewall contains a pre-authentication remote code execution vulnerability in the runphpcmd.php endpoint. The syscmd POST parameter is passed directly to a system command without validation and executed with root privileges. A remote, unauthenticated attacker can supply crafted values to execute arbitrary operating system commands as root, resulting in full device compromise.
Problem types
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Any version
Timeline
| 2021-05-03: | SSD Advisory is published. |
Credits
SSD Secure Disclosure
References
ssd-disclosure.com/...l-preauth-rce-and-password-disclosure/
ssd-disclosure.com/...l-preauth-rce-and-password-disclosure/
web.archive.org/...0211024224240/http://www.tg8security.com/
www.vulncheck.com/...l-unauthenticated-rce-via-runphpcmd-php