| शीर्षक | Advantech WISE-6610 v1.2.1_20251110 OS Command Injection |
|---|
| विवरण | There is a serious command injection vulnerability in the background management function of Advantech WISE-6610 industrial gateway. The vulnerability is located at the /cgi-bin/luci/admin/openvpn_apply interface. When an authenticated attacker sends a specific POST request to this interface, they can inject malicious system commands by manipulating the delete_file parameter. Due to the lack of user input filtering when the backend processes file deletion operations, the attacker can execute arbitrary commands on the device with root privileges. |
|---|
| स्रोत | ⚠️ https://github.com/master-abc/cve/issues/37 |
|---|
| उपयोगकर्ता | jiefengliang (UID 93721) |
|---|
| सबमिशन | 06/02/2026 08:39 AM (3 महीनों पहले) |
|---|
| संयम | 18/02/2026 10:17 AM (12 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 346467 [Advantech WISE-6610 1.2.1_20251110 Background Management openvpn_apply delete_file अधिकार वृद्धि] |
|---|
| अंक | 20 |
|---|