OS Command Injection Vulnerability in Linksys ESeries Routers
CVE-2018-3953
What is CVE-2018-3953?
Linksys ESeries routers have a vulnerability that allows OS command injection through improper filtering of user inputs. Specifically, the issue arises when data entered into the 'Router Name' field via the web portal is mishandled in the backend process. When the 'preinit' binary receives a SIGHUP signal, it processes a user-controlled NVRAM entry that determines the hostname. This value is subsequently executed in a command that writes to a file, posing a significant security risk as it can be leveraged by attackers to execute arbitrary commands on the router.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
ESeries E1200 Firmware Version 2.0.09
ESeries E2500 Firmware Version 3.0.04
References
EPSS Score
68% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved