WSN Forum 1.3.4 and earlier allows remote attackers to execute arbitrary PHP code via a modified pathname in the pathtoconfig parameter that points to an avatar image that contains PHP code, which is then accessed from prestart.php. NOTE: this issue has been labeled remote file inclusion, but that label only applies to the attack, not the underlying vulnerability.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T19:48:30.258Z
Reserved: 2006-10-19T00:00:00
Link: CVE-2006-5421

No data.

Status : Modified
Published: 2006-10-20T14:07:00.000
Modified: 2024-11-21T00:19:10.367
Link: CVE-2006-5421

No data.