6.5
CVSSv2

CVE-2017-13713

Published: 07/09/2017 Updated: 03/10/2019
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

T&W WIFI Repeater BE126 allows remote authenticated users to execute arbitrary code via shell metacharacters in the user parameter to cgi-bin/webupg.

Vulnerable Product Search on Vulmon Subscribe to Product

twsz wifi_repeater_firmware -

Exploits

# Exploit Title: WIFI Repeater BE126 – Remote Code Execution # Date Publish: 09/09/2017 # Exploit Authors: Hay Mizrachi, Omer Kaspi # Contact: haymizrachi@gmailcom, komerk0@gmailcom # Vendor Homepage: wwwtwszcom # Category: Webapps # Version: 10 # Tested on: Windows/Ubuntu 1604 # CVE: CVE-2017-13713 1 - Description: HTTP POST re ...
Wireless Repeater BE126 suffers from a remote code execution vulnerability ...