漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Visteon Infotainment UPDATES_ExtractFile Command Injection Remote Code Execution Vulnerability
Vulnerability Description
Visteon Infotainment UPDATES_ExtractFile Command Injection Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Visteon Infotainment systems. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UPDATES_ExtractFile function. A crafted software update file can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23422.
CVSS Information
N/A
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
Visteon Infotainment 操作系统命令注入漏洞
Vulnerability Description
Visteon Infotainment是美国伟世通(Visteon)公司的一个汽车信息娱乐系统。 Visteon Infotainment存在操作系统命令注入漏洞,该漏洞源于UPDATES_ExtractFile函数处理特制软件更新文件时系统调用不当,导致攻击者在受影响的安装上执行任意代码。
CVSS Information
N/A
Vulnerability Type
N/A