CVE-2026-34796 in Firewall信息

摘要 (英语)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_openvpn.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

负责

VulnCheck

预定

2026-03-30

披露

2026-04-02

状态

已确认

条目

VulDB provides additional information and datapoints for this CVE:

来源

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!