{"uuid": "546dbe94-6cf6-4ece-823e-6f103199ca7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-6079", "type": "published-proof-of-concept", "source": "https://t.me/information_security_channel/20630", "content": "Exploit CVE-2017-6079 \u2013 Blind Command Injection In Edgewater Edgemarc Devices Exploit\nhttps://kalilinuxtutorials.com/exploit-injection-edgewater-edgemarc/\n\nThis exploit was developed based on the technical description by depthsecurity https://depthsecurity.com/blog/cve-2017-6079-blind-command-injection-in-edgewater-edgemarc-devices The HTTP web-management application on Edgewater Networks Edgemarc appliances has a hidden page that allows for user-defined commands such as specific iptables routes, etc., to be set. You can use this page as a web shell essentially to execute commands, though you get [\u2026]\nThe post Exploit CVE-2017-6079 \u2013 Blind Command Injection In Edgewater Edgemarc Devices Exploit (https://kalilinuxtutorials.com/exploit-injection-edgewater-edgemarc/) appeared first on Kali Linux Tutorials (https://kalilinuxtutorials.com/).", "creation_timestamp": "2018-09-26T15:59:16.000000Z"}