Gargoyle router management utility versions 1.5.x contain an authenticated OS command execution vulnerability in /utility/run_commands.sh. The application fails to properly restrict or validate input supplied via the 'commands' parameter, allowing an authenticated attacker to execute arbitrary shell commands on the underlying system. Successful exploitation may result in full compromise of the device, including unauthorized access to system files and execution of attacker-controlled commands.
Metrics
Affected Vendors & Products
References
History
Wed, 31 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Gargoyle router management utility versions 1.5.x contain an authenticated OS command execution vulnerability in /utility/run_commands.sh. The application fails to properly restrict or validate input supplied via the 'commands' parameter, allowing an authenticated attacker to execute arbitrary shell commands on the underlying system. Successful exploitation may result in full compromise of the device, including unauthorized access to system files and execution of attacker-controlled commands. | |
| Title | Gargoyle 1.5.x Authenticated OS Command Execution via run_commands.sh | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-31T20:48:11.986Z
Reserved: 2025-07-24T19:41:10.249Z
Link: CVE-2015-10145
No data.
Status : Received
Published: 2025-12-31T21:15:50.920
Modified: 2025-12-31T21:15:50.920
Link: CVE-2015-10145
No data.
OpenCVE Enrichment
No data.