Learn about CVE-2017-12075, a high-severity vulnerability in Synology DiskStation Manager (DSM) allowing remote authenticated users to execute arbitrary commands. Find mitigation steps and preventive measures here.
A vulnerability related to command injection has been discovered in the EZ-Internet feature of Synology DiskStation Manager (DSM) versions prior to 6.2-23739. This vulnerability enables remote authenticated users to execute arbitrary commands by manipulating the username parameter.
Understanding CVE-2017-12075
This CVE involves a command injection vulnerability in Synology DiskStation Manager (DSM) that allows remote authenticated users to execute arbitrary commands.
What is CVE-2017-12075?
The vulnerability in the EZ-Internet feature of Synology DSM versions before 6.2-23739 allows manipulation of the username parameter to execute unauthorized commands.
The Impact of CVE-2017-12075
The vulnerability has a CVSS base score of 7.2, indicating a high severity level with significant impacts on confidentiality, integrity, and availability of affected systems.
Technical Details of CVE-2017-12075
This section provides detailed technical information about the vulnerability.
Vulnerability Description
The vulnerability is classified as CWE-77 - Improper Neutralization of Special Elements used in a Command, allowing for command injection via the username parameter.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protecting systems from CVE-2017-12075 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates