漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
OpenWebif 1.2.5 allows remote code execution via a URL to the CallOPKG function in the IpkgController class in plugin/controllers/ipkg.py, when the URL refers to an attacker-controlled web site with a Trojan horse package. This has security implications in cases where untrusted users can trigger CallOPKG calls, and these users can enter an arbitrary URL in an input field, even though that input field was only intended for a package name. This threat model may be relevant in the latest versions of third-party products that bundle OpenWebif, i.e., set-top box products. The issue of Trojan horse packages does NOT have security implications in cases where the attacker has full OpenWebif access.
漏洞信息
N/A
漏洞
N/A
漏洞
OpenWebif 安全漏洞
漏洞信息
OpenWebif是一款应用在基于Linux平台的机顶盒中的开源Web接口插件。 OpenWebif 1.2.5版本中存在安全漏洞,该漏洞源于plugin/controllers/ipkg.py文件中的IpkgController类的‘CallOPKG’函数没有限制或正确的限制输入包的名称。远程攻击者可利用该漏洞执行代码。
漏洞信息
N/A
漏洞
N/A