Command Injection Vulnerability in eScan Web Management Console by MicroWorld Technologies
CVE-2014-125118
What is CVE-2014-125118?
A command injection vulnerability exists in the eScan Web Management Console version 5.5-2. The vulnerability arises due to inadequate sanitation of the 'pass' parameter during login requests to login.php. This flaw permits an authenticated attacker, possessing a valid username, to inject arbitrary commands via a specially crafted password. Successful exploitation can lead to remote code execution, and attackers may escalate privileges to root by leveraging the runasroot utility with mwconf-level privileges. Mitigating this vulnerability is crucial to preventing unauthorized access and potential system compromise.
Affected Version(s)
eScan Web Management Console Linux 5.5-2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved