CVE-2017-14135 Scanner
CVE-2017-14135 scanner - Command Injection vulnerability in opendreambox
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month 3 days
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
OpenDreambox is an operating system designed for set-top boxes and digital television receivers. This open-source software is based on Linux and is primarily used by enthusiasts and developers who create custom images for various devices. The software allows users to customize and improve the functionality of their devices, making it a popular choice among tech-savvy individuals.
CVE-2017-14135 is a vulnerability discovered in the webadmin plugin for OpenDreambox version 2.0.0. The vulnerability allows remote attackers to execute arbitrary OS commands via shell metacharacters in the command parameter to the /script URI. This allows an attacker to gain unauthorized access to the system and perform malicious activities such as stealing sensitive information, installing malicious software, or taking control of the device without the user's knowledge.
If exploited, the CVE-2017-14135 vulnerability can have serious consequences. Attackers can use this vulnerability to gain complete control of the device and steal any information stored on it. This can include personal information such as banking details, social security numbers, and login credentials. The vulnerability can also be used to install malware, which can cause damage to the device or allow the attacker to control it remotely.
Thanks to the pro features of the s4e.io platform, users can easily and quickly learn about vulnerabilities in their digital assets. The platform offers comprehensive vulnerability management solutions that help businesses and individuals identify and remediate vulnerabilities in their systems. With s4e.io, users can ensure the security of their digital assets and protect against potential threats.
REFERENCES