Command Injection Vulnerability in Linksys E1500 Router
CVE-2024-42633
8.8HIGH
Summary
The Linksys E1500 router is susceptible to a Command Injection vulnerability within the do_upgrade_post function of its httpd binary. This security flaw permits an authenticated attacker to execute arbitrary OS commands with elevated privileges. By exploiting this vulnerability, attackers could potentially gain control over the router's operating system, leading to further exploits or network breaches. It is crucial for users to apply the necessary security patches and follow best practices to mitigate any risks associated with this vulnerability.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published