This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the decryptFile method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Marvell QConvergeConsole GUI |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-10502 is considered a critical vulnerability due to its potential for remote code execution.
To remediate ZDI-CAN-10502, update the Marvell QConvergeConsole to the latest version provided by the vendor.
ZDI-CAN-10502 affects installations of Marvell QConvergeConsole software.
No, ZDI-CAN-10502 requires authentication to exploit, but the authentication mechanism can be bypassed.
Exploitation of ZDI-CAN-10502 could allow remote attackers to execute arbitrary code on the affected system.