CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
54.1%
An issue was discovered on Systrome Cumilon ISG-600C, ISG-600H, and ISG-800W devices with firmware V1.1-R2.1_TRUNK-20181105.bin. A shell command injection occurs by editing the description of an ISP file. The file network/isp/isp_update_edit.php does not properly validate user input, which leads to shell command injection via the des parameter.
Vendor | Product | Version | CPE |
---|---|---|---|
systrome | cumilon_isg-600c_firmware | 1.1-r2.1 | cpe:2.3:o:systrome:cumilon_isg-600c_firmware:1.1-r2.1:*:*:*:*:*:*:* |
systrome | cumilon_isg-600c | - | cpe:2.3:h:systrome:cumilon_isg-600c:-:*:*:*:*:*:*:* |
systrome | cumilon_isg-600h_firmware | 1.1-r2.1 | cpe:2.3:o:systrome:cumilon_isg-600h_firmware:1.1-r2.1:*:*:*:*:*:*:* |
systrome | cumilon_isg-600h | - | cpe:2.3:h:systrome:cumilon_isg-600h:-:*:*:*:*:*:*:* |
systrome | cumilon_isg-800w_firmware | 1.1-r2.1 | cpe:2.3:o:systrome:cumilon_isg-800w_firmware:1.1-r2.1:*:*:*:*:*:*:* |
systrome | cumilon_isg-800w | - | cpe:2.3:h:systrome:cumilon_isg-800w:-:*:*:*:*:*:*:* |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
54.1%