An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise.
Metrics
Affected Vendors & Products
References
History
Wed, 09 Jul 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Engeniustech
Engeniustech epg5000 Engeniustech epg5000 Firmware Engeniustech esr1200 Engeniustech esr1200 Firmware Engeniustech esr1750 Engeniustech esr1750 Firmware Engeniustech esr300 Engeniustech esr300 Firmware Engeniustech esr350 Engeniustech esr350 Firmware Engeniustech esr600 Engeniustech esr600 Firmware Engeniustech esr900 Engeniustech esr900 Firmware |
|
CPEs | cpe:2.3:h:engeniustech:epg5000:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr1200:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr1750:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr300:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr350:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr600:-:*:*:*:*:*:*:* cpe:2.3:h:engeniustech:esr900:-:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.2.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.3.17:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.7.20:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:epg5000_firmware:1.3.9.21:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.3.1.34:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.4.1:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1200_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.2.2.27:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.3.1.34:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.1:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr1750_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.1.0.28:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.3.1.42:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.1.28:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.7:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr300_firmware:1.4.9:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.1.0.29:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.3.1.41:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.11:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr350_firmware:1.4.9:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.1.0.50:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.2.1.46:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.3.1.63:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.0.23:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.11:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.1:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.2:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.5:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr600_firmware:1.4.9:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.1.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.2.2.23:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.3.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.3.1.26:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.3.5.18:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.4.0:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.4.3:*:*:*:*:*:*:* cpe:2.3:o:engeniustech:esr900_firmware:1.4.5:*:*:*:*:*:*:* |
|
Vendors & Products |
Engeniustech
Engeniustech epg5000 Engeniustech epg5000 Firmware Engeniustech esr1200 Engeniustech esr1200 Firmware Engeniustech esr1750 Engeniustech esr1750 Firmware Engeniustech esr300 Engeniustech esr300 Firmware Engeniustech esr350 Engeniustech esr350 Firmware Engeniustech esr600 Engeniustech esr600 Firmware Engeniustech esr900 Engeniustech esr900 Firmware |
|
Metrics |
cvssV3_1
|
Tue, 24 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 24 Jun 2025 04:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 24 Jun 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 24 Jun 2025 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise. | |
Title | EnGenius EnShare IoT Gigabit Cloud Service Command Injection | |
Weaknesses | CWE-20 CWE-78 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-06-24T01:00:23.862Z
Updated: 2025-06-24T13:30:48.459Z
Reserved: 2025-04-15T19:15:22.546Z
Link: CVE-2025-34035

Updated: 2025-06-24T13:30:31.491Z

Status : Analyzed
Published: 2025-06-24T01:15:24.763
Modified: 2025-07-09T19:08:56.867
Link: CVE-2025-34035

No data.