A command injection vulnerability exists in the eScan Web Management Console version 5.5-2. The application fails to properly sanitize the 'pass' parameter when processing login requests to login.php, allowing an authenticated attacker with a valid username to inject arbitrary commands via a specially crafted password value. Successful exploitation results in remote code execution. Privilege escalation to root is possible by abusing the runasroot utility with mwconf-level privileges.
CVSS
No CVSS.
References
Configurations
No configuration.
History
25 Jul 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-25 16:15
Updated : 2025-07-25 16:15
NVD link : CVE-2014-125118
Mitre link : CVE-2014-125118
CVE.ORG link : CVE-2014-125118
JSON object : View
Products Affected
No product.