There is a command injection vulnerability in the Linksys WRT54GL router with firmware version 4.30.18.006. If an attacker gains web management privileges, they can inject commands into the post request parameters wl_ant, wl_rate, WL_atten_ctl, ttcp_num, ttcp_size in the httpd s Start_EPI() function, thereby gaining shell privileges.
References
Link | Resource |
---|---|
http://linksys.com | Product |
https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31742/Linksys_WRT54GL_RCE.pdf | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-05-22 17:15
Updated : 2023-05-30 15:37
NVD link : CVE-2023-31742
Mitre link : CVE-2023-31742
CVE.ORG link : CVE-2023-31742
JSON object : View
Products Affected
linksys
- wrt54gl_firmware
- wrt54gl
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')