This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability. The specific flaw exists within the UserServlet servlet. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Advantech iView |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-839 is critical due to its potential to allow remote code execution without authentication.
To fix ZDI-20-839, update Advantech iView to the latest version provided by the vendor.
ZDI-20-839 can facilitate remote code execution attacks, allowing attackers to run arbitrary code.
No, authentication is not required to exploit ZDI-20-839, making it particularly dangerous.
The affected product by ZDI-20-839 is Advantech iView.