Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
References
Link | Resource |
---|---|
https://resolverblog.blogspot.com/2020/07/linksys-re6500-unauthenticated-rce-full.html | Exploit Third Party Advisory |
https://downloads.linksys.com/support/assets/releasenotes/ExternalReleaseNotes_RE6500_1.0.012.001.txt | Release Notes Vendor Advisory |
https://bugcrowd.com/disclosures/72d7246b-f77f-4f7f-9bd1-fdc35663cc92/linksys-re6500-unauthenticated-rce-working-across-multiple-fw-versions | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-12-25 17:15
Updated : 2020-12-28 11:18
NVD link : CVE-2020-35713
Mitre link : CVE-2020-35713
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
linksys
- re6500_firmware
- re6500