Enigma2 Webadmin Remote Code Execution

Discussion in 'News Aggregator' started by Packet Storm, 11 Jan 2017.

  1. Packet Storm

    Packet Storm Guest

    An independent research uncovered a critical vulnerability in badly configured webadmin plugin of many thousand enigma2 boxes in the wild. This misconfiguration could be used by unauthenticated remote attackers to achieve remote arbitrary code execution in the context of root superuser. To exploit the vulnerability an attacker could target common ISP networks for dial-in users.

    Continue reading...
     

Share This Page

Loading...