Vulnerabilities (CVE)

Filtered by vendor Openwebif Project Subscribe
Filtered by product Openwebif
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-9333 1 Openwebif Project 1 Openwebif 2019-10-03 6.8 MEDIUM 8.8 HIGH
OpenWebif 1.2.5 allows remote code execution via a URL to the CallOPKG function in the IpkgController class in plugin/controllers/ipkg.py, when the URL refers to an attacker-controlled web site with a Trojan horse package. This has security implications in cases where untrusted users can trigger CallOPKG calls, and these users can enter an arbitrary URL in an input field, even though that input field was only intended for a package name. This threat model may be relevant in the latest versions of third-party products that bundle OpenWebif, i.e., set-top box products. The issue of Trojan horse packages does NOT have security implications in cases where the attacker has full OpenWebif access.
CVE-2018-20332 1 Openwebif Project 1 Openwebif 2019-02-07 5.0 MEDIUM 7.5 HIGH
An issue has been discovered in the OpenWebif plugin through 1.2.4 for Enigma2 based devices. Reading of arbitrary files is possible with /file?action=download&file= followed by a full pathname, and listing of arbitrary directories is possible with /file?action=download&dir= followed by a full pathname. This is related to plugin/controllers/file.py in the e2openplugin-OpenWebif project.