CVE-2007-3572
Yoggie Pico and Pico Pro - Remote Command Execution via runDiagnostics.cgi param Parameter
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2007-3572. PoCs published by Cody Brocious.
AI-analyzed exploit summary This exploit leverages a command injection vulnerability in Yoggie Pico and Pico Pro devices via the `runDiagnostics.cgi` endpoint. It allows an attacker to execute arbitrary commands with superuser privileges, including replacing the `/etc/shadow` file and starting an SSH server for remote access.
Description
Incomplete blacklist vulnerability in cgi-bin/runDiagnostics.cgi in the web interface on the Yoggie Pico and Pico Pro allows remote attackers to execute arbitrary commands via shell metacharacters in the param parameter, as demonstrated by URL encoded "`" (backtick) characters (%60 sequences).
Exploits (1)
This exploit leverages a command injection vulnerability in Yoggie Pico and Pico Pro devices via the `runDiagnostics.cgi` endpoint. It allows an attacker to execute arbitrary commands with superuser privileges, including replacing the `/etc/shadow` file and starting an SSH server for remote access.