2023-05-02 23:55:27 +02:00
|
|
|
{
|
|
|
|
"id": "CVE-2023-29778",
|
|
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
|
|
"published": "2023-05-02T20:15:10.813",
|
2023-05-03 14:00:27 +02:00
|
|
|
"lastModified": "2023-05-03T10:33:50.897",
|
|
|
|
"vulnStatus": "Awaiting Analysis",
|
2023-05-02 23:55:27 +02:00
|
|
|
"descriptions": [
|
|
|
|
{
|
|
|
|
"lang": "en",
|
|
|
|
"value": "GL.iNET MT3000 4.1.0 Release 2 is vulnerable to OS Command Injection via /usr/lib/oui-httpd/rpc/logread."
|
|
|
|
}
|
|
|
|
],
|
|
|
|
"metrics": {},
|
|
|
|
"references": [
|
|
|
|
{
|
|
|
|
"url": "http://glinet.com",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"url": "https://github.com/OlivierLaflamme/cve/blob/main/GL.iNET/MT3000/get_nginx_log_RCE.md",
|
|
|
|
"source": "cve@mitre.org"
|
|
|
|
}
|
|
|
|
]
|
|
|
|
}
|