CVE-2017-6079
CRITICAL EXPLOITED IN THE WILDEdgewater Networks Edgemarc - Command Injection
Title source: llmDescription
The HTTP web-management application on Edgewater Networks Edgemarc appliances has a hidden page that allows for user-defined commands such as specific iptables routes, etc., to be set. You can use this page as a web shell essentially to execute commands, though you get no feedback client-side from the web application: if the command is valid, it executes. An example is the wget command. The page that allows this has been confirmed in firmware as old as 2006.
Exploits (1)
nomisec
WORKING POC
18 stars
by MostafaSoliman · client-side
https://github.com/MostafaSoliman/CVE-2017-6079-Blind-Command-Injection-In-Edgewater-Edgemarc-Devices-Exploit
Scores
CVSS v3
9.8
EPSS
0.3236
EPSS Percentile
96.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2021-11-30
InTheWild.io
2021-10-27
Status
published
Products (1)
ribboncommunications/edgemarc_firmware
Published
May 16, 2017
Tracked Since
Feb 18, 2026