Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Viessmann Vitogate 300 OS Command Injection
Vulnerability Description
An OS command injection vulnerability has been discovered in the Vitogate 300, which can be exploited by malicious users to compromise affected installations. Specifically, the `/cgi-bin/vitogate.cgi` endpoint is affected, when the `form` JSON parameter is set to `form-0-2`. The vulnerability stems from the fact that that function at offset 0x21c24 does not properly sanitize supplied input before interpolating it into a format string which gets passed to `popen()`. Consequently, an authenticated attacker is able to inject arbitrary OS commands and thus gain code execution on affected devices.
CVSS Information
N/A
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
Viessmann Vitogate 300 安全漏洞
Vulnerability Description
Viessmann Vitogate 300是德国Viessmann公司的一款通信网关。 Viessmann Vitogate 300存在安全漏洞,该漏洞源于/cgi-bin/vitogate.cgi端点中form JSON参数设置为form-0-2时,未正确清理输入,可能导致OS命令注入攻击。
CVSS Information
N/A
Vulnerability Type
N/A