{ "schema_version": "1.4.0", "id": "GHSA-vr3w-v4c5-868f", "modified": "2022-05-17T00:00:53Z", "published": "2022-05-10T00:00:21Z", "aliases": [ "CVE-2022-27224" ], "details": "An issue was discovered in Galleon NTS-6002-GPS 4.14.103-Galleon-NTS-6002.V12 4. An authenticated attacker can perform command injection as root via shell metacharacters within the Network Tools section of the web-management interface. All three networking tools are affected (Ping, Traceroute, and DNS Lookup) and their respective input fields (ping_address, trace_address, nslookup_address).", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27224" }, { "type": "WEB", "url": "https://gist.github.com/somerandomdudeonetheinternet/2caeb201e249160fa82204ef640c8cdf" }, { "type": "WEB", "url": "https://www.galsys.co.uk/support/software-download.html" }, { "type": "WEB", "url": "https://www.pentestpartners.com/security-blog/galleon-nts-6002-gps-command-injection-vulnerability-cve-2022-27224" } ], "database_specific": { "cwe_ids": [ "CWE-77", "CWE-78" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-05-09T15:15:00Z" } }