Description
Tianxin Internet Behavior Management System contains a command injection vulnerability in the Reporter component endpoint that allows unauthenticated attackers to execute arbitrary commands by supplying a crafted objClass parameter containing shell metacharacters and output redirection. Attackers can exploit this vulnerability to write malicious PHP files into the web root and achieve remote code execution with the privileges of the web server process. This vulnerability has been fixed in version NACFirmware_4.0.0.7_20210716.180815_topsec_0_basic.bin. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-06-01 (UTC).
Problem types
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Any version before 4.0.0.7_20210716.180815
Credits
The Shadowserver Foundation
References
www.cnvd.org.cn/flaw/show/CNVD-2021-41972
www.cnvd.org.cn/patchInfo/show/280166
cn-sec.com/archives/4631959.html
avd.aliyun.com/detail?id=AVD-2021-890232
www.vulncheck.com/...ystem-command-injection-via-toquery-php