CVE-2007-3572

Yoggie Pico and Pico Pro - Remote Command Execution via runDiagnostics.cgi param Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-3572. PoCs published by Cody Brocious.

AI-analyzed exploit summary This exploit leverages a command injection vulnerability in Yoggie Pico and Pico Pro devices via the `runDiagnostics.cgi` endpoint. It allows an attacker to execute arbitrary commands with superuser privileges, including replacing the `/etc/shadow` file and starting an SSH server for remote access.

Description

Incomplete blacklist vulnerability in cgi-bin/runDiagnostics.cgi in the web interface on the Yoggie Pico and Pico Pro allows remote attackers to execute arbitrary commands via shell metacharacters in the param parameter, as demonstrated by URL encoded "`" (backtick) characters (%60 sequences).

Exploits (1)

exploitdb WORKING POC VERIFIED
by Cody Brocious · textwebappscgi
https://www.exploit-db.com/exploits/30260

This exploit leverages a command injection vulnerability in Yoggie Pico and Pico Pro devices via the `runDiagnostics.cgi` endpoint. It allows an attacker to execute arbitrary commands with superuser privileges, including replacing the `/etc/shadow` file and starting an SSH server for remote access.

Classification
Working Poc 90%
Attack Type
Rce
Complexity
Trivial
Reliability
Reliable
Target: Yoggie Pico and Pico Pro
No auth needed
Prerequisites: Network access to the Yoggie device · Device must be connected and accessible via `yoggie.yoggie.com`
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (7)

Core 7
Core References
Exploit, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/25902
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/35208
Third Party Advisory mailing-list x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0092.html
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2007/2417
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/24743
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/37808

Scores

EPSS 0.1003
EPSS Percentile 93.2%

Details

Status published
Products (2)
yoggie/pico
yoggie/pico_pro
Published Jul 05, 2007
Tracked Since Feb 18, 2026