logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2022-27224

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2022-27224

Description:
An issue was discovered in Galleon NTS-6002-GPS 4.14.103-Galleon-NTS-6002.V12 4. An authenticated attacker can perform command injection as root via shell metacharacters within the Network Tools section of the web-management interface. All three networking tools are affected (Ping, Traceroute, and DNS Lookup) and their respective input fields (ping_address, trace_address, nslookup_address).
Last updated date:
10/12/2022
Type:
exploit
Confidence:
HIGH
Date of publishing:
10/12/2022
Reference url to background

https://www.pentestpartners.com/security-blog/galleon-nts-6002-gps-command-injection-vulnerability-cve-2022-27224/

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2024

Privacy Policy