The firmware allows malicious files to be uploaded without any checking of extensions and allows filed to be uploaded. To exploit, visit the application, go to the advanced settings post login, under backup- restore page upload any random file extension and hit go. Upon the file being upload, the firmware will get rebooted accepting the arbitrary file.
The application interface of Ecessa's ShieldLink 60, 175, 600,1200 & 4000 allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site.
This exploit allows an attacker to change the router login password and enable SSH daemon by exploiting a Cross-Site Request Forgery vulnerability in the ASUS RT-AC750GF router with default firmware version 3.0.0.4.380.6038.
DIGISOL DG-BR4000NG is vulnerable to Cross-Site Scripting (XSS) attack. An attacker can inject malicious JavaScript code into the SSID field of the router's web interface, which will be executed when a user visits the page. This can be exploited to steal user credentials, hijack user sessions, redirect users to malicious websites, etc.
A buffer overflow vulnerability exists in the DIGISOL DG-BR4000NG Wireless Router. An attacker can exploit this vulnerability by sending a crafted request with a string of 500 ì0îs after the Authorization Basic string to the router's web interface. This will cause the router to restart and the web interface to become faulty.
The firmware allows malicious request to be executed without verifying source of request. This leads to arbitrary execution with malicious request which will lead to the creation of a privileged user.
Advanced Order Export For WooCommerce plugin version 1.5.4 and before are affected by the vulnerability Remote Command Execution using CSV Injection. This allows a public user to inject commands as a part of form fields and when a user with higher privilege exports the form data in CSV opens the file on their machine, the command is executed.
This exploit allows an attacker to execute arbitrary code on the vulnerable server by exploiting a Local File Inclusion vulnerability in phpMyAdmin versions 4.8.0 and 4.8.1. The attacker can run a SQL query to include a malicious PHP file in the session file, which can then be accessed via a URL. This will allow the attacker to execute arbitrary code on the vulnerable server.
This exploit is a proof of concept for a resource exhaustion vulnerability in Opencart version 3.0.2.0 and below. The exploit works by sending multiple requests to the google_sitemap route, which can cause the server to become overloaded and unresponsive.
phpLDAPadmin 1.2.2 is vulnerable to LDAP injection in the 'server_id' parameter. An attacker can inject malicious LDAP statements into the 'server_id' parameter and execute arbitrary commands on the server. This can be exploited to gain access to the application and the underlying system.