First published: Mon Oct 16 2023(Updated: )
An OS command injection vulnerability exists in the httpd iperfrun.cgi functionality of FreshTomato 2023.3. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.
Credit: cve_disclosure@tech.gov.sg cve_disclosure@tech.gov.sg
Affected Software | Affected Version | How to fix |
---|---|---|
Freshtomato Freshtomato | =2023.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3991 is an OS command injection vulnerability in the httpd iperfrun.cgi functionality of FreshTomato 2023.3.
CVE-2023-3991 has a severity rating of 9.8 (critical).
CVE-2023-3991 allows arbitrary command execution when a specially crafted HTTP request is received by the httpd iperfrun.cgi functionality of FreshTomato 2023.3.
CVE-2023-3991 is associated with CWE-77 (Improper Neutralization of Special Elements used in a Command) and CWE-78 (Improper Neutralization of Special Elements used in an OS Command) weaknesses.
You can find more information about CVE-2023-3991 at https://govtech-csg.github.io/security-advisories/2023/10/16/CVE-2023-3991.html.