ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote attackers to execute arbitrary commands via shell metacharacters in the pip parameter in an Ajax tag_ipPing request, a different vulnerability than CVE-2013-3581.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.kb.cert.org/vuls/id/932044 | Exploit US Government Resource | 
| http://www.kb.cert.org/vuls/id/932044 | Exploit US Government Resource | 
Configurations
                    History
                    21 Nov 2024, 01:56
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.kb.cert.org/vuls/id/932044 - Exploit, US Government Resource | 
Information
                Published : 2013-06-30 19:28
Updated : 2025-04-11 00:51
NVD link : CVE-2013-4731
Mitre link : CVE-2013-4731
CVE.ORG link : CVE-2013-4731
JSON object : View
Products Affected
                choice-wireless
- wixfmr-111
CWE
                
                    
                        
                        CWE-287
                        
            Improper Authentication
