Loading
Generated remediation guidance and an executive summary. No account required.
EyesOfNetwork eonweb through 5.3-11 allows Remote Command Execution (by authenticated users) via shell metacharacters in the nagios_path parameter to lilac/export.php, as demonstrated by %26%26+curl to insert an "&& curl" substring for the shell.
Use CWE-78, Eyesofnetwork vendor hub and Eyesofnetwork product page to widen CVE-2021-33525 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2022-41572, CVE-2022-41571 and CVE-2022-41570 for nearby disclosures in the same product family.