CVE-2017-17411
CRITICAL
9,8
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH
10,0
Source: [email protected]
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete
Description
AI Translation Available
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,9216
Percentile
1,0th
Updated
EPSS Score Trend (Last 90 Days)
78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
StableCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Availability
Non-Repudiation
Potential Impacts:
Execute Unauthorized Code Or Commands
Dos: Crash, Exit, Or Restart
Read Files Or Directories
Modify Files Or Directories
Read Application Data
Modify Application Data
Hide Activities
Applicable Platforms
Technologies:
AI/ML, Not Technology-Specific, Web Server
Exploit
Linksys WVBR0 - 'User-Agent' Remote Command Injection
Linksys WVBR0 - 'User-Agent' Remote Command Injection
View Exploit Code →
Exploit
Linksys WVBR0-25 - User-Agent Command Execution (Metasploit)
Metasploit Framework (MSF)Linksys WVBR0-25 - User-Agent Command Execution (Metasploit)
View Exploit Code →
Operating System
Wvbr0 Firmware by Linksys
Version Range Affected
To
1.0.41
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:linksys:wvbr0_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/rapid7/metasploit-framework/pull/9336
https://www.exploit-db.com/exploits/43363/
https://www.exploit-db.com/exploits/43429/
https://zerodayinitiative.com/advisories/ZDI-17-973
http://www.securityfocus.com/bid/102212
https://github.com/rapid7/metasploit-framework/pull/9336
https://www.exploit-db.com/exploits/43363/
https://www.exploit-db.com/exploits/43429/
https://zerodayinitiative.com/advisories/ZDI-17-973
http://www.securityfocus.com/bid/102212