An issue exists in the OpenWebif plugin up to and including 1.2.4 for E2 open devices. The saveConfig function of "plugin/controllers/models/config.py" performs an eval() call on the contents of the "key" HTTP GET parameter. This allows an unauthenticated remote malicious user to execute arbitrary Python code or OS commands via api/saveconfig.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openwebif project openwebif |