WAN Emulator v2.3 contains two unauthenticated command execution vulnerabilities. The result.php script calls shell_exec() with unsanitized input from the pc POST parameter, allowing remote attackers to execute arbitrary commands as the www-data user. The system also includes a SUID-root binary named dosu, which is vulnerable to command injection via its first argument. An attacker can exploit both flaws in sequence to achieve full remote code execution and escalate privileges to root.
History

Tue, 12 Aug 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wan Emulator
Wan Emulator wan Emulator
Vendors & Products Wan Emulator
Wan Emulator wan Emulator

Fri, 08 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 08 Aug 2025 18:30:00 +0000

Type Values Removed Values Added
Description WAN Emulator v2.3 contains two unauthenticated command execution vulnerabilities. The result.php script calls shell_exec() with unsanitized input from the pc POST parameter, allowing remote attackers to execute arbitrary commands as the www-data user. The system also includes a SUID-root binary named dosu, which is vulnerable to command injection via its first argument. An attacker can exploit both flaws in sequence to achieve full remote code execution and escalate privileges to root.
Title WAN Emulator v2.3 Command Execution
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-08T18:13:25.483Z

Updated: 2025-08-08T18:45:42.058Z

Reserved: 2025-08-07T19:40:15.368Z

Link: CVE-2012-10041

cve-icon Vulnrichment

Updated: 2025-08-08T18:45:32.172Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-08T19:15:33.847

Modified: 2025-08-08T20:30:18.180

Link: CVE-2012-10041

cve-icon Redhat

No data.