Vulnerability Details : CVE-2014-9727
Public exploit exists!
AVM Fritz!Box allows remote attackers to execute arbitrary commands via shell metacharacters in the var:lang parameter to cgi-bin/webcm.
Products affected by CVE-2014-9727
- cpe:2.3:a:avm:fritz\!box:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-9727
87.55%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2014-9727
-
Fritz!Box Webcm Unauthenticated Command Injection
Disclosure Date: 2014-02-11First seen: 2020-04-26exploit/linux/http/fritzbox_echo_execDifferent Fritz!Box devices are vulnerable to an unauthenticated OS command injection. This module was tested on a Fritz!Box 7270 from the LAN side. The vendor reported the following devices vulnerable: 7570, 7490, 7390, 7360, 7340, 7330, 7272, 7270, 7170 Annex A A/C
CVSS scores for CVE-2014-9727
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2014-9727
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-9727
-
https://www.trustwave.com/Resources/SpiderLabs-Blog/-Honeypot-Alert--Fritz%21Box-%E2%80%93-Remote-Command-Execution-Exploit-Attempt/
-
http://www.exploit-db.com/exploits/33136
Fritz!Box - Remote Command Execution - Hardware webapps ExploitExploit
-
https://www.trustwave.com/Resources/SpiderLabs-Blog/-Honeypot-Alert--Fritz!Box-%E2%80%93-Remote-Command-Execution-Exploit-Attempt/
404 Not Found | Trustwave
-
http://www.osvdb.org/103289
404 Not Found
Jump to