CVE-2018-16752

LINK-NET LW-N605R devices with firmware 12.20.2.1486 allow Remote Code Execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.
References
Link Resource
https://www.exploit-db.com/exploits/45351/ Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/149297/LW-N605R-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:linknet-usa:lw-n605r_firmware:12.20.2.1486:*:*:*:*:*:*:*
cpe:2.3:h:linknet-usa:lw-n605r:-:*:*:*:*:*:*:*

Information

Published : 2018-09-20 13:29

Updated : 2019-10-02 17:03


NVD link : CVE-2018-16752

Mitre link : CVE-2018-16752


JSON object : View

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-1188

Insecure Default Initialization of Resource

Advertisement

dedicated server usa

Products Affected

linknet-usa

  • lw-n605r_firmware
  • lw-n605r