提交 #573492: Netcore NBR1005GPE;COVER5;NBR100;NBR200;POWER13;B6;NAP930;NAP830 NBR1005GPEV2_V1.3.241107.015153;NBR100V2 V1.3.240614.030928; NBR200V2 V1.3.241127.071246;NAP930 V0.1.241010.141410;NAP830 V0.1.2 Command Injection信息

标题Netcore NBR1005GPE;COVER5;NBR100;NBR200;POWER13;B6;NAP930;NAP830 NBR1005GPEV2_V1.3.241107.015153;NBR100V2 V1.3.240614.030928; NBR200V2 V1.3.241127.071246;NAP930 V0.1.241010.141410;NAP830 V0.1.2 Command Injection
描述Vendor's Website(Domestic URL):https://www.netcoretec.com/ (Foreign URL):https://www.netis-systems.com/ There is an unauthorized command injection vulnerability in multiple router and wireless AP products of Netcore (Netis Technology). Scripts such as acbackup, backup, ac_upgrade, upgrade, and upgradeAP located under /www/cgi-bin/ have incomplete parameter filtering. Attackers can use this vulnerability to execute commands like rm -rf / to damage the router system. Discoverer: Exploo0Osion. Please contact Netcore (Netis Technology) technical support to fix this vulnerability in a timely manner.
来源⚠️ https://anonymous.4open.science/r/netcore_unauth-7D2E
用户
 ricardo123 (UID 83496)
提交2025-05-08 03時53分 (12 月前)
管理2025-05-24 15時37分 (16 days later)
状态已接受
VulDB条目310233 [Netcore POWER13 直到 20250508 Query String /www/cgi-bin/ 权限提升]
积分20

Do you need the next level of professionalism?

Upgrade your account now!