** UNSUPPORTED WHEN ASSIGNED ** The administration web interface on Belkin Linksys WRT160NL 1.0.04.002_US_20130619 devices allows remote authenticated attackers to execute system commands with root privileges via shell metacharacters in the ui_language POST parameter to the apply.cgi form endpoint. This occurs in do_upgrade_post in mini_httpd. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link | Resource |
---|---|
https://research.nccgroup.com/2021/01/28/technical-advisory-linksys-wrt160nl-authenticated-command-injection-cve-2021-25310/ | Exploit Third Party Advisory |
https://research.nccgroup.com/?research=Technical%20advisories | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-02-02 07:15
Updated : 2021-02-05 06:15
NVD link : CVE-2021-25310
Mitre link : CVE-2021-25310
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
belkin
- linksys_wrt160nl_firmware
- linksys_wrt160nl