Description
Easywall 0.3.1 allows authenticated remote command execution via a command injection vulnerability in the /ports-save endpoint that suffers from a parameter injection flaw. Attackers can inject shell metacharacters to execute arbitrary commands on the server.
Problem types
CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Product status
0.3.1
Credits
Melvin Mejia
References
www.exploit-db.com/exploits/51856 (ExploitDB-51856)
jpylypiw.github.io/easywall/ (Easywall Homepage)
github.com/jpylypiw/easywall (Easywall GitHub Repository)
www.vulncheck.com/...ommand-injection-in-ports-save-endpoint