7.8 High
AI Score
Confidence
Low
8.3 High
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:N/C:C/I:C/A:C
0.972 High
EPSS
Percentile
99.8%
httpd.c in httpd in the management GUI in DD-WRT 24 sp1, and other versions before build 12533, allows remote attackers to execute arbitrary commands via shell metacharacters in a request to a cgi-bin/ URI.
CPE | Name | Operator | Version |
---|---|---|---|
dd-wrt:dd-wrt | dd-wrt | le | 24 |
isc.sans.org/diary.html?storyid=6853
metasploit.com/svn/framework3/trunk/modules/exploits/linux/http/ddwrt_cgibin_exec.rb
securitytracker.com/id?1022596
www.dd-wrt.com/
www.dd-wrt.com/phpBB2/viewtopic.php?t=55173
www.exploit-db.com/exploits/9209
www.osvdb.org/55990
www.securityfocus.com/bid/35742
www.theregister.co.uk/2009/07/21/critical_ddwrt_router_vuln/