Overview
- Description
- This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.
- Source
- zdi-disclosures@trendmicro.com
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linksys:wvbr0_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89C14B79-5C23-4DF4-8607-C5B14DAC75EF", "versionEndExcluding": "1.0.41" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:linksys:wvbr0:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B1129E8A-FAF1-4B2D-829C-B01DC003F04C" } ], "operator": "OR" } ], "operator": "AND" } ]