إرسال #797086: Linksys MR9600 Firmware 2.0.6.206937 Command Injectionالمعلومات

عنوانLinksys MR9600 Firmware 2.0.6.206937 Command Injection
الوصفAn authenticated OS command injection vulnerability exists in Linksys MR9600 firmware 2.0.6.206937. The issue is reachable through the JNAP action BTRequestGetSmartConnectStatus. The user-controlled `pin` parameter is passed into `bluetooth.btGetSmartConnectStatus2(pin)`, then concatenated into `/etc/init.d/run_central2.sh`, where it is ultimately used in `/usr/bin/btsetup_central $OPTION` without proper quoting. This allows an authenticated attacker to inject arbitrary shell commands and achieve root command execution. The vulnerable code path requires the device to be in Master mode.
المصدر⚠️ https://github.com/utmost3/cve/issues/2
المستخدم
 wuuu (UID 93536)
ارسال04/04/2026 12:37 PM (22 أيام منذ)
الاعتدال24/04/2026 09:40 PM (20 days later)
الحالةتمت الموافقة
إدخال VulDB359544 [Linksys MR9600 2.0.6.206937 JNAP Action run_central2.sh BTRequestGetSmartConnectStatus pin تجاوز الصلاحيات]
النقاط20

Do you want to use VulDB in your project?

Use the official API to access entries easily!