CVE-2015-10145
Unknown Unknown - Not Provided
Authenticated OS Command Injection in Gargoyle Router Utility

Publication date: 2025-12-31

Last updated on: 2025-12-31

Assigner: VulnCheck

Description
Gargoyle router management utility versions 1.5.x contain an authenticated OS command execution vulnerability in /utility/run_commands.sh. The application fails to properly restrict or validate input supplied via the 'commands' parameter, allowing an authenticated attacker to execute arbitrary shell commands on the underlying system. Successful exploitation may result in full compromise of the device, including unauthorized access to system files and execution of attacker-controlled commands.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-31
Last Modified
2025-12-31
Generated
2026-05-06
AI Q&A
2025-12-31
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gargoyle gargoyle_router_management_utility 1.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2015-10145 is an authenticated OS command execution vulnerability in Gargoyle Router Management Utility version 1.5.x. The flaw exists in the /utility/run_commands.sh script, where the application fails to properly validate or restrict input supplied via the 'commands' parameter. This allows an authenticated attacker to inject and execute arbitrary shell commands on the underlying system, potentially leading to full device compromise. [1]


How can this vulnerability impact me? :

Exploitation of this vulnerability can result in full compromise of the affected device. An attacker with authentication can execute arbitrary commands, gain unauthorized access to system files, and control the device. This can lead to loss of confidentiality, integrity, and availability of the device and its network environment. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for exploit attempts targeting the /utility/run_commands.sh script with malicious input in the 'commands' parameter. While no specific commands are provided for detection, Resource 2 mentions that Snort IDS rules can be used to detect exploit attempts by matching signatures such as "execute_script", "sys_list", and "ASPSESSIONID". Implementing these IDS rules can help identify attempts to exploit this vulnerability on your network. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the Gargoyle router management utility to trusted users only, ensuring that only authenticated users can access the /utility/run_commands.sh functionality, and applying any available patches or updates from Gargoyle to fix the vulnerability in version 1.5.x. Additionally, monitoring for suspicious activity using IDS rules as mentioned can help detect exploitation attempts early. If possible, disable or restrict the vulnerable functionality until a patch is applied. [1, 2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an authenticated attacker to execute arbitrary shell commands on the device, potentially leading to full device compromise and unauthorized access to system files. Such a compromise could result in unauthorized access to sensitive data, which may violate data protection requirements under standards like GDPR and HIPAA. Therefore, exploitation of this vulnerability could negatively impact compliance with these regulations by exposing confidential information and failing to maintain system integrity and availability. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart