CVE IDs | Summary | Base Score | Vector |
Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/set_sys_time/` API is affected by a command injection vulnerability. | 9.1 | CVSS:3.0/AV:N/AC:L/PR: H/UI:N/S:C/C:H/I:H/A:H | |
Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/remove/` API is affected by a command injection vulnerability. | 9.1 | CVSS:3.0/AV:N/AC:L/PR: H/UI:N/S:C/C:H/I:H/A:H | |
Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/remove_sniffer_raw_log/` API is affected by a command injection vulnerability. | 9.1 | CVSS:3.0/AV:N/AC:L/PR: H/UI:N/S:C/C:H/I:H/A:H | |
Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/config_rollback/` API is affected by a command injection vulnerability. | 9.1 | CVSS:3.0/AV:N/AC:L/PR: H/UI:N/S:C/C:H/I:H/A:H | |
Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/clear_tools_log/` API is affected by command injection vulnerability. | 9.1 | CVSS:3.0/AV:N/AC:L/PR: H/UI:N/S:C/C:H/I:H/A:H | |
Multiple command injection vulnerabilities exist in the web_server action endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/action/import_sdk_file/` API is affected by command injection vulnerability. | 9.1 | CVSS:3.0/AV:N/AC:L/PR: H/UI:N/S:C/C:H/I:H/A:H | |
Multiple command injection vulnerabilities exist in the web_server action endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/action/import_https_cert_file/` API is affected by command injection vulnerability. | 9.1 | CVSS:3.0/AV:N/AC:L/PR: H/UI:N/S:C/C:H/I:H/A:H | |
Multiple command injection vulnerabilities exist in the web_server action endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/action/import_cert_file/` API is affected by command injection vulnerability. | 9.1 | CVSS:3.0/AV:N/AC:L/PR: H/UI:N/S:C/C:H/I:H/A:H | |
A command execution vulnerability exists in the clish art2 functionality of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger this vulnerability. | 9.1 | CVSS:3.0/AV:N/AC:L/PR: H/UI:N/S:C/C:H/I:H/A:H | |
A data removal vulnerability exists in the web_server /action/remove/ API functionality of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary file deletion. An attacker can send a sequence of requests to trigger this vulnerability. | 8.7 | CVSS:3.0/AV:N/AC:L/PR: H/UI:N/S:C/C:N/I:H/A:H |
CVE IDs Addressed | Vulnerablity Report Date | Product Name | Affected Versions | Updated Version |
June 30, 2022; 3:15:08 PM | All RobustOS Devices | V3.x.x | V5.0.0 | |
June 30, 2022; 3:15:08 PM | All RobustOS Devices | V3.x.x | V5.0.0 | |
June 30, 2022; 3:15:08 PM | All RobustOS Devices | V3.x.x | V5.0.0 | |
June 30, 2022; 3:15:08 PM | All RobustOS Devices | V3.x.x | V5.0.0 | |
June 30, 2022; 3:15:08 PM | All RobustOS Devices | V3.x.x | V5.0.0 | |
June 30, 2022; 3:15:08 PM | All RobustOS Devices | V3.x.x | V5.0.0 | |
June 30, 2022; 3:15:08 PM | All RobustOS Devices | V3.x.x | V5.0.0 | |
June 30, 2022; 3:15:08 PM | All RobustOS Devices | V3.x.x | V5.0.0 | |
June 30, 2022; 3:15:08 PM | All RobustOS Devices | V3.x.x | V5.0.0 | |
June 30, 2022; 3:15:08 PM | All RobustOS Devices | V3.x.x | V5.0.0 |
Revision | Date | Description |
1.0 | August 10th, 2022 | Initial release |