CVE-2019-9161
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
18/04/2019
Last modified:
24/08/2020
Description
WAC on the Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier has a Remote Code Execution issue allowing remote attackers to achieve full access to the system, because shell metacharacters in the nginx_webconsole.php Cookie header can be used to read an etc/config/wac/wns_cfg_admin_detail.xml file containing the admin password. (The password for root is the WebUI admin password concatenated with a static string.)
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:xinruidz:sundray_wan_controller_firmware:*:*:*:*:*:*:*:* | 3.7.4.2 (including) | |
cpe:2.3:h:xinruidz:sundray_wan_controller:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page