Arbitrary code execution in Linksys WUMC710
CVE-2022-43971
7.2HIGH
Summary
An arbitrary code execution vulnerability is present in the Linksys WUMC710 Wireless-AC Universal Media Connector, specifically in the do_setNTP function of the httpd binary. This vulnerability arises from the use of unvalidated user input for assembling a system command. An attacker with authenticated administrator access can exploit this weakness by sending a malicious GET or POST request to /setNTP.cgi, allowing the execution of arbitrary commands on the device's underlying Linux operating system with root privileges.
Affected Version(s)
Linksys WUMC710 Wireless-AC Universal Media Connector Firmware <= 1.0.02 (build 3)
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Jessie Chick of Trellix ARC