Index
Bugtraq
Pełna lista
Błędy
Sztuczki
Exploity
Dorks list
Tylko z CVE
Tylko z CWE
Bogus
Ranking
CVEMAP
Świeża lista CVE
Producenci
Produkty
Słownik CWE
Sprawdź nr. CVE
Sprawdź nr. CWE
Szukaj
W Bugtraq
W bazie CVE
Po autorze
Po nr. CVE
Po nr. CWE
Po producencie
Po produkcie
RSS
Bugtraq
CVEMAP
CVE Produkty
Tylko Błędy
Tylko Exploity
Tylko Dorks
Więcej
cIFrex
Facebook
Twitter
Donate
O bazie
Lang
Polish
English
Submit
Podatności dla
'E2500 firmware'
2018-10-16
CVE-2018-3955
CWE-78
An exploitable operating system command injection exists in the Linksys ESeries line of routers (Linksys E1200 Firmware Version 2.0.09 and Linksys E2500 Firmware Version 3.0.04). Specially crafted entries to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send an authenticated HTTP request to trigger this vulnerability. Data entered into the 'Domain Name' input field through the web portal is submitted to apply.cgi as the value to the 'wan_domain' POST parameter. The wan_domain data goes through the nvram_set process described above. When the 'preinit' binary receives the SIGHUP signal it enters a code path that calls a function named 'set_host_domain_name' from its libshared.so shared object.
CVE-2018-3954
CWE-78
Devices in the Linksys ESeries line of routers (Linksys E1200 Firmware Version 2.0.09 and Linksys E2500 Firmware Version 3.0.04) are susceptible to OS command injection vulnerabilities due to improper filtering of data passed to and retrieved from NVRAMData entered into the 'Router Name' input field through the web portal is submitted to apply.cgi as the value to the 'machine_name' POST parameter. When the 'preinit' binary receives the SIGHUP signal it enters a code path that calls a function named 'set_host_domain_name' from its libshared.so shared object.
CVE-2018-3953
CWE-78
Devices in the Linksys ESeries line of routers (Linksys E1200 Firmware Version 2.0.09 and Linksys E2500 Firmware Version 3.0.04) are susceptible to OS command injection vulnerabilities due to improper filtering of data passed to and retrieved from NVRAM. Data entered into the 'Router Name' input field through the web portal is submitted to apply.cgi as the value to the 'machine_name' POST parameter. When the 'preinit' binary receives the SIGHUP signal, it enters a code path that continues until it reaches offset 0x0042B5C4 in the 'start_lltd' function. Within the 'start_lltd' function, a 'nvram_get' call is used to obtain the value of the user-controlled 'machine_name' NVRAM entry. This value is then entered directly into a command intended to write the host name to a file and subsequently executed.
>>>
Vendor:
Linksys
66
Produkty
Wap11
Befsr41
Befn2ps4
Befsr81
Befvp41
Befsr11
Befsru31
Befsx41
Befw11s4
Hpro200
Wet11
Wap55ag
Befcmu10
Befsr41w
Rv082
Wrt54g
Wvc11b
Befsr41 v3
Psus4 printserver
Wrt54gs
Befw11s4 v3
Befw11s4 v4
Wrt54g v5
Rt31p2
Wpc300n wireless-n notebook adapter driver
Wip 330 wireless-g ip phone
Spa921
Wag200g
Wrt54gc
Spa941
Wag54gs
Wrt350n
Wap4400n
Wrt54gl
Wrt300n
Spa-2102 phone adapter
Wap400n
Wap54gv3
Wrt54gx
Ea6500
Ea6500 firmware
E4200v2
Ea2700
Ea3500
Ea4500
Ea6200
Ea6300
Ea6400
Ea6700
Ea6900
E4200v2 firmware
Ea2700 firmware
Ea3500 firmware
Ea4500 firmware
Ea6200 firmware
Ea6300 firmware
Ea6400 firmware
Ea6700 firmware
Ea6900 firmware
Velop firmware
E1200 firmware
E2500 firmware
Wrt1900acs firmware
Wag54g2 firmware
Re6300 firmware
Re6400 firmware
Copyright
2024
, cxsecurity.com
Back to Top