关键漏洞信息 漏洞标题 Gargoyle 1.5.x Authenticated OS Command Execution via run_commands.sh 严重性 等级: HIGH 发布日期 December 31, 2025 影响范围 受影响的软件: Gargoyle Router Management Utility v1.5.x 漏洞类型 CVE编号: CVE-2015-10145 CWE编号: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CVSS评分 评分: 8.6/10 向量字符串: CVSS:3.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/WI:H/VA:H/SC:N/SI:N/SA:N 描述 Gargoyle router management utility versions 1.5.x contain an authenticated OS command execution vulnerability in /utility/run_commands.sh. The application fails to properly restrict or validate input supplied via the 'commands' parameter, allowing an authenticated attacker to execute arbitrary shell commands on the underlying system. Successful exploitation may result in full compromise of the device, including unauthorized access to system files and execution of attacker-controlled commands. 引用 Packet Storm Exploit Entry Gargoyle Router Project Homepage X Lab AIRASHI Botnet Exploitation Blog 发现者 Provensec