{ "schema_version": "1.4.0", "id": "GHSA-wp7f-x92c-rf9x", "modified": "2022-05-13T01:44:13Z", "published": "2022-05-13T01:44:13Z", "aliases": [ "CVE-2017-16923" ], "details": "Command Injection vulnerability in app_data_center on Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01, Ac9 ac9_kf_V15.03.05.19(6318_)_cn, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01, and Ac18 ac18_kf_V15.03.05.19(6318_)_cn devices allows remote unauthenticated attackers to execute arbitrary OS commands via a crafted cgi-bin/luci/usbeject?dev_name= GET request from the LAN. This occurs because the \"sub_A6E8 usbeject_process_entry\" function executes a system function with untrusted input.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16923" }, { "type": "WEB", "url": "https://github.com/Iolop/Poc/tree/master/Router/Tenda" } ], "database_specific": { "cwe_ids": [ "CWE-78" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-11-21T14:29:00Z" } }