CVE-2015-10145

HIGH8.7/ 10.0
Share:
Published: December 31, 2025 at 09:15 PM
Modified: January 29, 2026 at 04:53 PM
Source: disclosure@vulncheck.com

Vulnerability Description

Gargoyle router management utility versions 1.5.x contain an authenticated OS command execution vulnerability in /utility/run_commands.sh. The application fails to properly restrict or validate input supplied via the 'commands' parameter, allowing an authenticated attacker to execute arbitrary shell commands on the underlying system. Successful exploitation may result in full compromise of the device, including unauthorized access to system files and execution of attacker-controlled commands.

CVSS Metrics

Base Score
8.7
Severity
HIGH
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: disclosure@vulncheck.com

AI Security Analysis

01 // Technical Summary

Gargoyle router management utility versions 1.5.x are vulnerable to authenticated OS command execution, allowing attackers to execute arbitrary commands on the device. This vulnerability, stemming from improper input validation in the /utility/run_commands.sh script, can lead to complete system compromise, including data exfiltration and remote control of the router.

02 // Vulnerability Mechanism

Step 1: Authentication: The attacker successfully authenticates to the Gargoyle router's management interface. This requires valid credentials, which could be obtained through various means (e.g., brute-force, phishing, default credentials).

Step 2: Payload Delivery: The attacker crafts a malicious payload containing shell commands designed to be executed on the router. This payload is constructed to exploit the vulnerability in the /utility/run_commands.sh script.

Step 3: Parameter Injection: The attacker submits the malicious payload through the 'commands' parameter of the /utility/run_commands.sh script, typically via an HTTP POST request.

Step 4: Command Execution: The router's web server processes the request, and the /utility/run_commands.sh script executes the attacker-supplied commands without proper sanitization.

Step 5: System Compromise: The attacker's commands are executed with the privileges of the web server process, allowing them to perform actions such as reading sensitive files, modifying system configurations, installing backdoors, or gaining a reverse shell.

03 // Deep Technical Analysis

The vulnerability lies within the /utility/run_commands.sh script of Gargoyle router management utility versions 1.5.x. The script fails to properly sanitize or validate user-supplied input provided through the 'commands' parameter. Specifically, the script likely directly incorporates the user-provided 'commands' parameter into a shell command without proper escaping or filtering. This allows an authenticated attacker to inject arbitrary shell commands. The root cause is a lack of input validation and output encoding, leading to a command injection vulnerability. The script likely uses a function like system() or exec() without proper sanitization, enabling the attacker to execute malicious commands. The absence of proper input validation allows the attacker to bypass security measures and execute commands with the privileges of the web server process, which typically has elevated permissions on the router.

CVE-2015-10145 - HIGH Severity (8.7) | Free CVE Database | 4nuxd