Vulnerability Description
ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote attackers to execute arbitrary commands via shell metacharacters in the pip parameter in an Ajax tag_ipPing request, a different vulnerability than CVE-2013-3581.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Choice-Wireless | Wixfmr-111 | - |
Related Weaknesses (CWE)
References
- http://www.kb.cert.org/vuls/id/932044ExploitUS Government Resource
- http://www.kb.cert.org/vuls/id/932044ExploitUS Government Resource
FAQ
What is CVE-2013-4731?
CVE-2013-4731 is a vulnerability with a CVSS score of 9.3 (HIGH). ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote attackers to execute arbitrary commands via shell metacharacters in the pip parameter in an Aj...
How severe is CVE-2013-4731?
CVE-2013-4731 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4731?
Check the references section above for vendor advisories and patch information. Affected products include: Choice-Wireless Wixfmr-111.