Gargoyle router management utility versions 1.5.x contain an authenticated OS command execution vulnerability in /utility/run_commands.sh. The application fails to properly restrict or validate input supplied via the 'commands' parameter, allowing an authenticated attacker to execute arbitrary shell commands on the underlying system. Successful exploitation may result in full compromise of the device, including unauthorized access to system files and execution of attacker-controlled commands.
Metrics
Affected Vendors & Products
References
History
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gargoyle-router
Gargoyle-router gargoyle |
|
| Vendors & Products |
Gargoyle-router
Gargoyle-router gargoyle |
Fri, 02 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 31 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gargoyle router management utility versions 1.5.x contain an authenticated OS command execution vulnerability in /utility/run_commands.sh. The application fails to properly restrict or validate input supplied via the 'commands' parameter, allowing an authenticated attacker to execute arbitrary shell commands on the underlying system. Successful exploitation may result in full compromise of the device, including unauthorized access to system files and execution of attacker-controlled commands. | |
| Title | Gargoyle 1.5.x Authenticated OS Command Execution via run_commands.sh | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-31T20:48:11.986Z
Updated: 2026-01-02T14:36:00.930Z
Reserved: 2025-07-24T19:41:10.249Z
Link: CVE-2015-10145
Updated: 2026-01-02T14:18:43.796Z
Status : Awaiting Analysis
Published: 2025-12-31T21:15:50.920
Modified: 2026-01-02T16:45:26.640
Link: CVE-2015-10145
No data.