LibreNMS 1.46 allows remote attackers to execute arbitrary OS commands by using the $_POST['community'] parameter to html/pages/addhost.inc.php during creation of a new device, and then making a /ajax_output.php?id=capture&format=text&type=snmpwalk&hostname=localhost request that triggers html/includes/output/capture.inc.php command mishandling.
{
"nvd_published_at": "2019-04-24T21:29:00Z",
"github_reviewed": true,
"github_reviewed_at": "2024-04-24T22:10:15Z",
"cwe_ids": [
"CWE-78"
],
"severity": "CRITICAL"
}