漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Viessmann Vitogate 300 OS Command Injection
Vulnerability Description
An OS command injection vulnerability has been discovered in the Vitogate 300, which can be exploited by malicious users to compromise affected installations. Specifically, the `/cgi-bin/vitogate.cgi` endpoint is affected, when the `form` JSON parameter is set to `form-0-2`. The vulnerability stems from the fact that that function at offset 0x21c24 does not properly sanitize supplied input before interpolating it into a format string which gets passed to `popen()`. Consequently, an authenticated attacker is able to inject arbitrary OS commands and thus gain code execution on affected devices.
CVSS Information
N/A
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
Viessmann Vitogate 300 安全漏洞
Vulnerability Description
Viessmann Vitogate 300是德国Viessmann公司的一款通信网关。 Viessmann Vitogate 300存在安全漏洞,该漏洞源于/cgi-bin/vitogate.cgi端点中form JSON参数设置为form-0-2时,未正确清理输入,可能导致OS命令注入攻击。
CVSS Information
N/A
Vulnerability Type
N/A