An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 24 Jun 2025 04:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 24 Jun 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 24 Jun 2025 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise. | |
Title | EnGenius EnShare IoT Gigabit Cloud Service Command Injection | |
Weaknesses | CWE-20 CWE-78 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-06-24T01:00:23.862Z
Updated: 2025-06-24T13:30:48.459Z
Reserved: 2025-04-15T19:15:22.546Z
Link: CVE-2025-34035

Updated: 2025-06-24T13:30:31.491Z

Status : Awaiting Analysis
Published: 2025-06-24T01:15:24.763
Modified: 2025-06-26T18:58:14.280
Link: CVE-2025-34035

No data.