从这个网页截图中,可以获取到以下关于漏洞的关键信息: 1. 漏洞编号:#423561 2. 漏洞标题:Mitrastar GPT-2541GNAC BR_g5.6_1.11(WVK.0)b26 OS Command Injection 3. 漏洞描述: - Mitrastar router is vulnerable to a authenticated remote code execution in the firewall settings page. - It is a blind command injection. - The "SrcInterface" was tested and it is vulnerable. - It is possible to run a ping command in the router. - Run tcpdump in the other end and see the packets being received. - It is possible to send a netcat to the router and execute a reverse shell. - The privileges obtained is full (root). 4. 漏洞来源: - https://github.com/peritocibernetico/VivoCodeExecutionFirewall/ 5. 提交者:peritocibernetico (ID 74140) 6. 提交时间:10/14/2024 06:35 PM 7. 审核时间:10/15/2024 08:00 AM 8. 状态:Accepted 9. VulDB Entry:280344 10. 积分:19 这些信息详细描述了漏洞的性质、影响范围以及提交和审核的过程。