ID

VAR-201209-0798


TITLE

WAN Emulator result.php pc parameter arbitrary command execution vulnerability

Trust: 0.6

sources: CNVD: CNVD-2012-5385

DESCRIPTION

The WAN Emulator is a wide area network simulator. There is an illegal access vulnerability in the WAN Emulator. This vulnerability can be triggered by installing the setuid root in the dosu binary, causing the local attacker to gain root privileges.

Trust: 0.6

sources: CNVD: CNVD-2012-5385

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-5385

AFFECTED PRODUCTS

vendor:sourceforgemodel:wan emulatorscope: - version: -

Trust: 0.6

vendor:sourceforgemodel:wan emulatorscope:eqversion:2.3

Trust: 0.6

sources: CNVD: CNVD-2012-5385

EXTERNAL IDS

db:CNVDid:CNVD-2012-5385

Trust: 0.6

sources: CNVD: CNVD-2012-5385

REFERENCES

url:http://www.metasploit.com/modules/exploit/linux/http/wanem_exechttp

Trust: 0.6

sources: CNVD: CNVD-2012-5385

SOURCES

db:CNVDid:CNVD-2012-5385

LAST UPDATE DATE

2022-05-04T08:58:03.509000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-5385date:2012-09-25T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-5385date:2012-09-25T00:00:00