CVE-2017-6079

CRITICAL EXPLOITED IN THE WILD

Edgewater Networks Edgemarc - Command Injection

Title source: llm

Description

The HTTP web-management application on Edgewater Networks Edgemarc appliances has a hidden page that allows for user-defined commands such as specific iptables routes, etc., to be set. You can use this page as a web shell essentially to execute commands, though you get no feedback client-side from the web application: if the command is valid, it executes. An example is the wget command. The page that allows this has been confirmed in firmware as old as 2006.

Exploits (1)

nomisec WORKING POC 18 stars
by MostafaSoliman · client-side
https://github.com/MostafaSoliman/CVE-2017-6079-Blind-Command-Injection-In-Edgewater-Edgemarc-Devices-Exploit

Scores

CVSS v3 9.8
EPSS 0.3236
EPSS Percentile 96.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2021-11-30
InTheWild.io 2021-10-27
Status published
Products (1)
ribboncommunications/edgemarc_firmware
Published May 16, 2017
Tracked Since Feb 18, 2026