Vulnerability Description
cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote attackers to execute arbitrary commands via shell metacharacters in the query string.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Aztech | Adsl2\/2\+4-Port Router | 3.7.0 |
Related Weaknesses (CWE)
References
- http://core.ifconfig.se/~core/?p=21
- http://osvdb.org/44267Exploit
- http://secunia.com/advisories/29551Vendor Advisory
- http://www.securityfocus.com/archive/1/490100/100/0/threaded
- http://www.securityfocus.com/bid/28458Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41492
- http://core.ifconfig.se/~core/?p=21
- http://osvdb.org/44267Exploit
- http://secunia.com/advisories/29551Vendor Advisory
- http://www.securityfocus.com/archive/1/490100/100/0/threaded
- http://www.securityfocus.com/bid/28458Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41492
FAQ
What is CVE-2008-6554?
CVE-2008-6554 is a vulnerability with a CVSS score of 10.0 (HIGH). cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote attackers to execute arbitrary commands via shell metacharacters in the query string.
How severe is CVE-2008-6554?
CVE-2008-6554 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-6554?
Check the references section above for vendor advisories and patch information. Affected products include: Aztech Adsl2\/2\+4-Port Router.