OS Command Injection Vulnerability in Linksys ESeries Routers
CVE-2018-3954
7.2HIGH
Summary
Linksys ESeries routers are vulnerable to an OS command injection attack that exploits improper data filtering in the router's web portal. Specifically, the vulnerability allows attackers to manipulate the 'Router Name' input field, sending malicious data to the router's configuration functions via the 'apply.cgi' interface. This can ultimately enable unauthorized access and control over the router's settings, making it imperative for users to apply the necessary updates to secure their devices.
Affected Version(s)
ESeries E1200 Firmware Version 2.0.09
ESeries E2500 Firmware Version 3.0.04
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved