Vulnerabilities > Fruitywifi Project
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-11-05 | CVE-2020-24849 | OS Command Injection vulnerability in Fruitywifi Project Fruitywifi A remote code execution vulnerability is identified in FruityWifi through 2.4. | 8.8 |
2020-10-23 | CVE-2020-24848 | Improper Privilege Management vulnerability in Fruitywifi Project Fruitywifi FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. | 7.8 |
2020-10-23 | CVE-2020-24847 | Cross-Site Request Forgery (CSRF) vulnerability in Fruitywifi Project Fruitywifi A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. | 4.3 |
2018-11-11 | CVE-2018-19168 | OS Command Injection vulnerability in Fruitywifi Project Fruitywifi Shell Metacharacter Injection in www/modules/save.php in FruityWifi (aka PatatasFritas/PatataWifi) through 2.4 allows remote attackers to execute arbitrary code with root privileges via a crafted mod_name parameter in a POST request. | 9.8 |
2018-09-21 | CVE-2018-17317 | OS Command Injection vulnerability in Fruitywifi Project Fruitywifi 2.1 FruityWifi (aka PatatasFritas/PatataWifi) 2.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the io_mode, ap_mode, io_action, io_in_iface, io_in_set, io_in_ip, io_in_mask, io_in_gw, io_out_iface, io_out_set, io_out_mask, io_out_gw, iface, or domain parameter to /www/script/config_iface.php, or the newSSID, hostapd_secure, hostapd_wpa_passphrase, or supplicant_ssid parameter to /www/page_config.php. | 9.8 |