There is a command injection vulnerability in the Linksys E2000 router with firmware version 1.0.06. If an attacker gains web management privileges, they can inject commands into the post request parameters wl_ssid, wl_ant, wl_rate, WL_atten_ctl, ttcp_num, ttcp_size in the httpd s Start_EPI() function, thereby gaining shell privileges.
References
Link | Resource |
---|---|
http://linksys.com | Product |
https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31741/Linksys_E2000_RCE_2.pdf | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-05-23 01:15
Updated : 2023-05-31 00:26
NVD link : CVE-2023-31741
Mitre link : CVE-2023-31741
CVE.ORG link : CVE-2023-31741
JSON object : View
Products Affected
linksys
- e2000_firmware
- e2000
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')