This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of calls to the getExportDataDetails method of the TaskMgrTable class. When parsing the col_list HTTP parameter, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
Affected Software | Affected Version | How to fix |
---|---|---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-10660 is high, as it allows remote attackers to execute arbitrary code without authentication.
To fix ZDI-CAN-10660, update Advantech iView to the latest patched version provided by the vendor.
The potential impacts of ZDI-CAN-10660 include unauthorized remote code execution, leading to data compromise or system control.
No, authentication is not required to exploit ZDI-CAN-10660, making it particularly dangerous.
The affected software for ZDI-CAN-10660 is Advantech iView.