Operating System Command Injection in Linksys ESeries Routers
CVE-2018-3955

7.2HIGH

Key Information:

Vendor
Linksys
Vendor
CVE Published:
17 October 2018

Summary

An operating system command injection vulnerability exists in the Linksys ESeries line of routers. By providing specially crafted entries in the network configuration settings, an attacker can execute arbitrary system commands on devices such as the Linksys E1200 and E2500. Specifically, this vulnerability can be triggered through an authenticated HTTP request that inputs malicious data into the 'Domain Name' field on the router's web interface. This input is processed in a way that allows the execution of unauthorized commands, potentially giving full control over the affected device.

Affected Version(s)

ESeries E1200 Firmware Version 2.0.09

ESeries E2500 Firmware Version 3.0.04

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.