A command injection vulnerability has been discovered in the bootstrap stage of Bitdefender BOX 2, versions 2.1.47.42 and 2.1.53.45. The API method `/api/download_image` unsafely handles the production firmware URL supplied by remote servers, leading to arbitrary execution of system commands. In order to exploit the condition, an unauthenticated attacker should impersonate a infrastructure server to trigger this vulnerability.
2020-01-27T18:15:12.493
2024-11-21T04:31:40.967
Modified
CVSSv3.1: 8.1 (HIGH)
AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | bitdefender | box_2_firmware | 2.1.47.42 | Yes |
Operating System | bitdefender | box_2_firmware | 2.1.53.45 | Yes |
Hardware | bitdefender | box_2 | - | No |