OS Command Injection Vulnerability in peplink Surf SOHO HW1 v6.3.5 (QEMU)

OS Command Injection Vulnerability in peplink Surf SOHO HW1 v6.3.5 (QEMU)

CVE-2023-35194 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

An OS command injection vulnerability exists in the api.cgi cmd.mvpn.x509.write functionality of peplink Surf SOHO HW1 v6.3.5 (in QEMU). A specially crafted HTTP request can lead to command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.This vulnerability is specifically for the `system` call in the file `/web/MANGA/cgi-bin/api.cgi` for firmware version 6.3.5 at offset `0x4bde44`.

Learn more about our Web App Pen Testing.