This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/102212 | vdb entry third party advisory |
https://github.com/rapid7/metasploit-framework/pull/9336 | third party advisory exploit |
https://www.exploit-db.com/exploits/43363/ | exploit vdb entry third party advisory |
https://zerodayinitiative.com/advisories/ZDI-17-973 | vdb entry third party advisory |
https://www.exploit-db.com/exploits/43429/ | exploit vdb entry third party advisory |