** UNSUPPORTED WHEN ASSIGNED ** The administration web interface on Belkin Linksys WRT160NL 1.0.04.002_US_20130619 devices allows remote authenticated attackers to execute system commands with root privileges via shell metacharacters in the ui_language POST parameter to the apply.cgi form endpoint. This occurs in do_upgrade_post in mini_httpd. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link | Resource |
---|---|
https://research.nccgroup.com/2021/01/28/technical-advisory-linksys-wrt160nl-authenticated-command-injection-cve-2021-25310/ | Exploit Third Party Advisory |
https://research.nccgroup.com/?research=Technical%20advisories | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
03 Jul 2024, 01:36
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-150 |
Information
Published : 2021-02-02 15:15
Updated : 2024-08-03 20:15
NVD link : CVE-2021-25310
Mitre link : CVE-2021-25310
CVE.ORG link : CVE-2021-25310
JSON object : View
Products Affected
belkin
- linksys_wrt160nl
- linksys_wrt160nl_firmware