CVE-2017-17888
Description
cgi-bin/write.cgi in Anti-Web through 3.8.7, as used on NetBiter / HMS, Ouman EH-net, Alliance System WS100 --> AWU 500, Sauter ERW100F001, Carlo Gavazzi SIU-DLG, AEDILIS SMART-1, SYXTHSENSE WebBiter, ABB SREA, and ASCON DY WebServer devices, allows remote authenticated users to execute arbitrary OS commands via crafted multipart/form-data content, a different vulnerability than CVE-2017-9097.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Anti-Web through 3.8.7 allows remote authenticated OS command injection via crafted multipart/form-data in cgi-bin/write.cgi.
Vulnerability
cgi-bin/write.cgi in Anti-Web through version 3.8.7 (used in numerous industrial IoT devices such as NetBiter/HMS, Ouman EH-net, Alliance System WS100, Sauter ERW100F001, Carlo Gavazzi SIU-DLG, AEDILIS SMART-1, SYXTHSENSE WebBiter, ABB SREA, and ASCON DY WebServer) contains a command injection flaw. The vulnerability is triggered by sending crafted multipart/form-data content to the script. This issue is distinct from CVE-2017-9097 [1].
Exploitation
An attacker must first obtain valid authentication credentials for the web interface. With authenticated access, the attacker sends an HTTP POST request to cgi-bin/write.cgi with specially crafted multipart/form-data payload. The parameters in the multipart data are not properly sanitized before being passed to a shell command, allowing arbitrary OS commands to be injected and executed [1].
Impact
Successful exploitation allows a remote authenticated attacker to execute arbitrary operating system commands on the affected device. This can lead to full compromise of the device, including data disclosure, modification, denial of service, or use as a pivot point for further attacks on the industrial network. The CVSS v3 score is 8.8 (High) [1].
Mitigation
According to the available reference [1], no official solution or temporary workaround was available at the time of disclosure. Users should monitor vendor advisories for patches. If the device is no longer supported (EOL), replacement or network segmentation is advised. The CVE is not listed on CISA's Known Exploited Vulnerabilities (KEV) catalog as of the publication date.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=3.8.7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/ezelf/AntiWeb_testing-Suite/tree/master/RCEnvdExploitIssue TrackingThird Party Advisory
- www.seebug.org/vuldb/ssvid-96555nvdExploitIssue TrackingThird Party Advisory
- www.youtube.com/watchnvdExploitIssue TrackingThird Party Advisory
News mentions
0No linked articles in our index yet.