Fruitywifi Project

Fruitywifi

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 4.77%
  • Veröffentlicht 05.11.2020 15:15:33
  • Zuletzt bearbeitet 21.11.2024 05:16:07

A remote code execution vulnerability is identified in FruityWifi through 2.4. Due to improperly escaped shell metacharacters obtained from the POST request at the page_config_adv.php page, it is possible to perform remote code execution by an authen...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 23.10.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:16:07

A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in page_config_adv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another ...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 23.10.2020 19:15:12
  • Zuletzt bearbeitet 21.11.2024 05:16:07

FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.

  • EPSS 5.78%
  • Veröffentlicht 11.11.2018 00:29:00
  • Zuletzt bearbeitet 21.11.2024 03:57:28

Shell Metacharacter Injection in www/modules/save.php in FruityWifi (aka PatatasFritas/PatataWifi) through 2.4 allows remote attackers to execute arbitrary code with root privileges via a crafted mod_name parameter in a POST request. NOTE: unlike in ...

Exploit
  • EPSS 3.3%
  • Veröffentlicht 21.09.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:54:13

FruityWifi (aka PatatasFritas/PatataWifi) 2.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the io_mode, ap_mode, io_action, io_in_iface, io_in_set, io_in_ip, io_in_mask, io_in_gw, io_out_iface, io_out_set, io_out_...