An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise.
References
Link | Resource |
---|---|
https://cxsecurity.com/issue/WLB-2017060050 | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/142792 | Broken Link |
https://vulncheck.com/advisories/engenius-enshare-iot-gigabit-cloud-service | Third Party Advisory |
https://www.exploit-db.com/exploits/42114 | Exploit Third Party Advisory |
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php | Exploit Third Party Advisory |
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
09 Jul 2025, 19:08
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://cxsecurity.com/issue/WLB-2017060050 - Exploit, Third Party Advisory | |
References | () https://packetstormsecurity.com/files/142792 - Broken Link | |
References | () https://vulncheck.com/advisories/engenius-enshare-iot-gigabit-cloud-service - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/42114 - Exploit, Third Party Advisory | |
References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php - Exploit, Third Party Advisory | |
First Time |
Engeniustech esr300
Engeniustech esr350 Firmware Engeniustech esr300 Firmware Engeniustech esr900 Engeniustech Engeniustech esr1200 Engeniustech esr350 Engeniustech esr1750 Firmware Engeniustech esr1200 Firmware Engeniustech epg5000 Engeniustech esr900 Firmware Engeniustech esr600 Firmware Engeniustech esr600 Engeniustech epg5000 Firmware Engeniustech esr1750 |
|
CPE | cpe:2.3:o:engeniustech:esr600_firmware:1.2.1.46:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.3.1.34:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.1:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr1200:-:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.9:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.11:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.2.2.23:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr900:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr600:-:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.1.28:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.3.1.26:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr1750:-:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.2.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.9:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.3.1.42:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.1.0.50:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.7:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.3.5.18:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.3.1.63:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.11:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.0.23:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.1:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr350:-:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.4.1:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.7.20:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.3.1.34:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr300:-:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.2.2.27:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.9.21:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.1.0.29:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.3.17:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.9:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.3.1.41:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:epg5000:-:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.1.0.28:*:*:*:*:*:*:* |
26 Jun 2025, 18:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 Jun 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php - |
24 Jun 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
24 Jun 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-24 01:15
Updated : 2025-07-09 19:08
NVD link : CVE-2025-34035
Mitre link : CVE-2025-34035
CVE.ORG link : CVE-2025-34035
JSON object : View
Products Affected
engeniustech
- esr900
- esr600
- esr1750
- esr1200
- epg5000
- esr350
- esr300_firmware
- esr300
- esr350_firmware
- esr1200_firmware
- esr900_firmware
- esr600_firmware
- epg5000_firmware
- esr1750_firmware