CVE-2012-10041
BaseFortify
Publication date: 2025-08-08
Last updated on: 2025-08-08
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wanem | wan_emulator | 2.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
WAN Emulator v2.3 has two unauthenticated command execution vulnerabilities. The result.php script uses shell_exec() with unsanitized input from the pc POST parameter, allowing remote attackers to execute arbitrary commands as the www-data user. Additionally, there is a SUID-root binary named dosu vulnerable to command injection via its first argument. Exploiting both flaws in sequence allows an attacker to achieve full remote code execution and escalate privileges to root.
How can this vulnerability impact me? :
An attacker can remotely execute arbitrary commands on the affected system without authentication, initially with www-data user privileges. By exploiting the dosu binary, the attacker can escalate privileges to root, gaining full control over the system. This can lead to unauthorized access, data theft, system compromise, and disruption of services.