Open
Description
{
"id": 1,
"title": "RVD#1: VGo Robot vulnerability: OS Command Injection",
"type": "vulnerability",
"description": "An attacker on an adjacent network could perform command injectionOn versions prior to VGo Robot 3.0.3.52164 are vulnerable: 3.0.3, 3.0.2, 2.1.0, 2.0.0, 1.5.5, 1.5.0, 1.4.2\r\n Credits to: Daniel Regalado from Zingbox reported this vulnerability to NCCIC.\r\n ",
"cwe": "CWE-OS Command Injection (CWE-78)",
"cve": "None",
"keywords": [
"malformed",
"robot",
"robot: Vgo",
"severity: critical",
"state: new",
"vendor: Vecna",
"vulnerability"
],
"system": "VGo Robot",
"vendor": "Vecna",
"severity": {
"rvss-score": "None",
"rvss-vector": "RVSS:1.0/AV:AN/AC:L/PR:N/UI:N/Y:O/S:U/C:H/I:H/A:H/H:H",
"severity-description": "",
"cvss-score": 0,
"cvss-vector": ""
},
"links": [
"https://github.com/aliasrobotics/RVD/issues/1"
],
"flaw": {
"phase": "unknown",
"specificity": "N/A",
"architectural-location": "N/A",
"application": "N/A",
"subsystem": "N/A",
"package": "N/A",
"languages": "None",
"date-detected": "2018-04-25 12:28:51",
"detected-by": "",
"detected-by-method": "N/A",
"date-reported": "2018-04-25 12:28:51",
"reported-by": "",
"reported-by-relationship": "N/A",
"issue": "https://github.com/aliasrobotics/RVD/issues/1",
"reproducibility": "",
"trace": null,
"reproduction": "",
"reproduction-image": ""
},
"exploitation": {
"description": "",
"exploitation-image": "",
"exploitation-vector": ""
},
"mitigation": {
"description": "",
"pull-request": "",
"date-mitigation": null
}
}