提交 #753293: Advantech WISE-6610 v1.2.1_20251110 OS Command Injection信息

标题Advantech WISE-6610 v1.2.1_20251110 OS Command Injection
描述There is a serious command injection vulnerability in the background management function of Advantech WISE-6610 industrial gateway. The vulnerability is located at the /cgi-bin/luci/admin/openvpn_apply interface. When an authenticated attacker sends a specific POST request to this interface, they can inject malicious system commands by manipulating the delete_file parameter. Due to the lack of user input filtering when the backend processes file deletion operations, the attacker can execute arbitrary commands on the device with root privileges.
来源⚠️ https://github.com/master-abc/cve/issues/37
用户
 jiefengliang (UID 93721)
提交2026-02-06 08時39分 (3 月前)
管理2026-02-18 10時17分 (12 days later)
状态已接受
VulDB条目346467 [Advantech WISE-6610 1.2.1_20251110 Background Management openvpn_apply delete_file 权限提升]
积分20

Do you want to use VulDB in your project?

Use the official API to access entries easily!