Remote Code Execution in Sierra Wireless AirLink ES450 Firmware
CVE-2018-4063
Key Information:
- Vendor
Sierrawireless
- Status
- Vendor
- CVE Published:
- 6 May 2019
Badges
What is CVE-2018-4063?
A serious remote code execution vulnerability affects the upload.cgi functionality within the Sierra Wireless AirLink ES450 firmware version 4.9.3. Attackers can exploit this vulnerability by sending specially crafted HTTP requests that allow them to upload executable files to the web server. Once successfully uploaded, this code can be executed, compromising the integrity of the device. Authentication is required to exploit this vulnerability, posing a significant risk to network security if not addressed promptly.
CISA has reported CVE-2018-4063
CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2018-4063 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace
The CISA's recommendation is: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Sierra Wireless Sierra Wireless AirLink ES450 FW 4.9.3
References
CVSS V3.1
Timeline
- ๐พ
Exploit known to exist
- ๐ฆ
CISA Reported
Vulnerability published
Vulnerability Reserved
