Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-16923

EPSS 3.47% · P88
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-16923

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Command Injection vulnerability in app_data_center on Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01, Ac9 ac9_kf_V15.03.05.19(6318_)_cn, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01, and Ac18 ac18_kf_V15.03.05.19(6318_)_cn devices allows remote unauthenticated attackers to execute arbitrary OS commands via a crafted cgi-bin/luci/usbeject?dev_name= GET request from the LAN. This occurs because the "sub_A6E8 usbeject_process_entry" function executes a system function with untrusted input.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款Shenzhen Tenda产品命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Shenzhen Tenda Ac9等都是中国腾达(Tenda)公司的无线路由器产品。app_data_center是其中的一个应用数据中心。 多款Shenzhen Tenda产品中的app_data_center存在命令注入漏洞,该漏洞源于‘sub_A6E8 usbeject_process_entry’函数使用不可信的输入执行系统功能。远程攻击者可通过发送特制的cgi-bin/luci/usbeject?dev_name= GET请求利用该漏洞执行任意的操作系统命令。以下版本受到影响:Shenzhen
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2017-16923

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-16923

登录查看更多情报信息。

Same Patch Batch · n/a · 2017-11-21 · 8 CVEs total

CVE-2015-3934Fiyo CMS SQL注入漏洞
CVE-2017-16664Open Ticket Request System 代码注入漏洞
CVE-2017-15044DocuWare Fulltext Search server 安全漏洞
CVE-2017-16613OpenStack Swauth 安全漏洞
CVE-2017-16920dayrui FineCms 安全漏洞
CVE-2017-16840FFmpeg VC-2 Video Compression解码器安全漏洞
CVE-2017-16919MapOS 跨站脚本漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2017-16923

No comments yet


Leave a comment