Submeter #768850: H3C Technologies ACG1000-AK230 ACG1000-AK230 Command Injectioninformação

TítuloH3C Technologies ACG1000-AK230 ACG1000-AK230 Command Injection
DescriçãoAs a leader in digital and AI solutions, H3C Group is committed to being a reliable partner for customer business innovation and digital transformation. However, a critical pre-authentication command execution vulnerability has been identified in the ACG1000-AK230 gateway, a network device under the H3C portfolio. The root cause lies in the application incorporating unsanitized user input directly into system commands. Exploiting this flaw, attackers can execute arbitrary operating system commands to gain full server control without authorization. If successfully exploited, this vulnerability could lead to the theft or modification of sensitive data (such as configuration files and credentials). The server may be remotely hijacked to become a "zombie" or mining rig. Furthermore, it may facilitate lateral movement into the internal network, potentially paralyzing the entire corporate infrastructure and causing catastrophic consequences for business continuity and data security.
Fonte⚠️ https://github.com/leeyper/CVE/issues/1
Utilizador
 leeyper (UID 95962)
Submissão27/02/2026 06h26 (há 1 mês)
Moderação11/03/2026 07h35 (12 days later)
EstadoAceite
Entrada VulDB350353 [H3C ACG1000-AK230 até 20260227 ?aaa_portal_auth_local_submit suffix Elevação de Privilégios]
Pontos20

Do you know our Splunk app?

Download it now for free!