CVE-2017-9757

HIGH

IPFire 2.19 - Command Injection

Title source: llm

Description

IPFire 2.19 has a Remote Command Injection vulnerability in ids.cgi via the OINKCODE parameter, which is mishandled by a shell. This can be exploited directly by authenticated users, or through CSRF.

Exploits (3)

exploitdb WORKING POC VERIFIED
by 0x09AL · pythonwebappslinux
https://www.exploit-db.com/exploits/42149
nomisec WORKING POC
by peterleiva · poc
https://github.com/peterleiva/CVE-2017-9757
metasploit WORKING POC EXCELLENT
by h00die <[email protected]>, 0x09AL · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/ipfire_oinkcode_exec.rb

Scores

CVSS v3 8.8
EPSS 0.7789
EPSS Percentile 99.0%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (1)
ipfire/ipfire < 2.19
Published Jun 19, 2017
Tracked Since Feb 18, 2026