WAC on the Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier has a Remote Code Execution issue allowing remote attackers to achieve full access to the system, because shell metacharacters in the nginx_webconsole.php Cookie header can be used to read an etc/config/wac/wns_cfg_admin_detail.xml file containing the admin password. (The password for root is the WebUI admin password concatenated with a static string.)
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
http://www.cnvd.org.cn/flaw/show/CNVD-2019-07679 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T21:38:46.622Z
Reserved: 2019-02-25T00:00:00
Link: CVE-2019-9161

No data.

Status : Modified
Published: 2019-04-18T23:29:00.517
Modified: 2024-11-21T04:51:06.693
Link: CVE-2019-9161

No data.