CVE-2015-5082

Endian Firewall < 2.5.1 - Command Injection

Title source: rule

Description

Endian Firewall before 3.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) NEW_PASSWORD_1 or (2) NEW_PASSWORD_2 parameter to cgi-bin/chpasswd.cgi.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/38096
exploitdb WORKING POC
by Ben Lincoln · textremotecgi
https://www.exploit-db.com/exploits/37428
exploitdb WORKING POC
by Ben Lincoln · pythonremotecgi
https://www.exploit-db.com/exploits/37426
metasploit WORKING POC EXCELLENT
by Ben Lincoln · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/efw_chpasswd_exec.rb

Scores

EPSS 0.8667
EPSS Percentile 99.4%

Details

CWE
CWE-77
Status published
Products (1)
endian_firewall/endian_firewall < 2.5.1
Published Sep 28, 2015
Tracked Since Feb 18, 2026