CVE-2019-7383

An issue was discovered on Systrome Cumilon ISG-600C, ISG-600H, and ISG-800W devices with firmware V1.1-R2.1_TRUNK-20181105.bin. A shell command injection occurs by editing the description of an ISP file. The file network/isp/isp_update_edit.php does not properly validate user input, which leads to shell command injection via the des parameter.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:systrome:cumilon_isg-600c_firmware:1.1-r2.1:*:*:*:*:*:*:*
cpe:2.3:h:systrome:cumilon_isg-600c:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:systrome:cumilon_isg-600h_firmware:1.1-r2.1:*:*:*:*:*:*:*
cpe:2.3:h:systrome:cumilon_isg-600h:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:systrome:cumilon_isg-800w_firmware:1.1-r2.1:*:*:*:*:*:*:*
cpe:2.3:h:systrome:cumilon_isg-800w:-:*:*:*:*:*:*:*

History

03 Feb 2023, 19:54

Type Values Removed Values Added
References (MISC) https://www.breakthesec.com/2019/02/cve-2019-7383-remote-code-execution-via.html - (MISC) https://www.breakthesec.com/2019/02/cve-2019-7383-remote-code-execution-via.html - Third Party Advisory
References (MISC) https://s3curityb3ast.github.io/KSA-Dev-003.md - (MISC) https://s3curityb3ast.github.io/KSA-Dev-003.md - Third Party Advisory

Information

Published : 2019-03-21 16:01

Updated : 2023-12-10 12:59


NVD link : CVE-2019-7383

Mitre link : CVE-2019-7383

CVE.ORG link : CVE-2019-7383


JSON object : View

Products Affected

systrome

  • cumilon_isg-600c
  • cumilon_isg-600c_firmware
  • cumilon_isg-800w
  • cumilon_isg-800w_firmware
  • cumilon_isg-600h
  • cumilon_isg-600h_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')