module
Geutebruck testaction.cgi Remote Command Execution
| Disclosed |
|---|
| May 20, 2020 |
Disclosed
May 20, 2020
Description
This module exploits an authenticated arbitrary command execution vulnerability within the 'server'
GET parameter of the /uapi-cgi/testaction.cgi page of Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx,
ETHC-22xx, and EWPC-22xx devices running firmware versions versions 1.12.13.2 and 1.12.14.5 when the 'type' GET paramter is set to 'ntp'.
Successful exploitation results in remote code execution as the root user.
GET parameter of the /uapi-cgi/testaction.cgi page of Geutebruck G-Cam EEC-2xxx and G-Code EBC-21xx, EFD-22xx,
ETHC-22xx, and EWPC-22xx devices running firmware versions versions 1.12.13.2 and 1.12.14.5 when the 'type' GET paramter is set to 'ntp'.
Successful exploitation results in remote code execution as the root user.
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.