A remote command injection vulnerability exists in the confirm.php interface of the WIFISKY 7-layer Flow Control Router via a specially-crafted HTTP GET request to the t parameter. Insufficient input validation allows unauthenticated attackers to execute arbitrary OS commands. Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-25 UTC.
CVSS
No CVSS.
References
Configurations
No configuration.
History
17 Nov 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | ||
| Summary | (en) A remote command injection vulnerability exists in the confirm.php interface of the WIFISKY 7-layer Flow Control Router via a specially-crafted HTTP GET request to the t parameter. Insufficient input validation allows unauthenticated attackers to execute arbitrary OS commands. Exploitation evidence was observed by the Shadowserver Foundation on 2025-01-25 UTC. |
Information
Published : 2025-06-26 16:15
Updated : 2025-11-17 22:15
NVD link : CVE-2025-34044
Mitre link : CVE-2025-34044
CVE.ORG link : CVE-2025-34044
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
