제출 #573492: Netcore NBR1005GPE;COVER5;NBR100;NBR200;POWER13;B6;NAP930;NAP830 NBR1005GPEV2_V1.3.241107.015153;NBR100V2 V1.3.240614.030928; NBR200V2 V1.3.241127.071246;NAP930 V0.1.241010.141410;NAP830 V0.1.2 Command Injection정보

제목Netcore NBR1005GPE;COVER5;NBR100;NBR200;POWER13;B6;NAP930;NAP830 NBR1005GPEV2_V1.3.241107.015153;NBR100V2 V1.3.240614.030928; NBR200V2 V1.3.241127.071246;NAP930 V0.1.241010.141410;NAP830 V0.1.2 Command Injection
설명Vendor's Website(Domestic URL):https://www.netcoretec.com/ (Foreign URL):https://www.netis-systems.com/ There is an unauthorized command injection vulnerability in multiple router and wireless AP products of Netcore (Netis Technology). Scripts such as acbackup, backup, ac_upgrade, upgrade, and upgradeAP located under /www/cgi-bin/ have incomplete parameter filtering. Attackers can use this vulnerability to execute commands like rm -rf / to damage the router system. Discoverer: Exploo0Osion. Please contact Netcore (Netis Technology) technical support to fix this vulnerability in a timely manner.
원천⚠️ https://anonymous.4open.science/r/netcore_unauth-7D2E
사용자
 ricardo123 (UID 83496)
제출2025. 05. 08. AM 03:53 (12 개월 ago)
모더레이션2025. 05. 24. PM 03:37 (16 days later)
상태수락
VulDB 항목310233 [Netcore POWER13 까지 20250508 Query String /www/cgi-bin/ 권한 상승]
포인트들20

Do you want to use VulDB in your project?

Use the official API to access entries easily!