Description
An unauthenticated command injection vulnerability exists in WePresent WiPG-1000 firmware versions prior to 2.2.3.0, due to improper input handling in the undocumented /cgi-bin/rdfs.cgi endpoint. The Client parameter is not sanitized before being passed to a system call, allowing an unauthenticated remote attacker to execute arbitrary commands as the web server user.
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2025-34103, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2025-34103 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- http://webappsec.pbworks.com/OS-Commanding
- https://capec.mitre.org/data/definitions/108.html
- https://capec.mitre.org/data/definitions/15.html
- https://capec.mitre.org/data/definitions/43.html
- https://capec.mitre.org/data/definitions/6.html
- https://capec.mitre.org/data/definitions/88.html
- https://nvd.nist.gov/vuln/detail/CVE-2025-34103