提出 #626690: Linksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection情報

タイトルLinksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection
説明We found an command Injection vulnerability in Linksys router with firmware which was released recently, allows remote attackers to execute arbitrary OS commands from a crafted request.In RP_setBasicAuto function, staticIp、staticNetmask is directly passed by the attacker, so we can control the staticIp、staticNetmask to attack the OS.
ソース⚠️ https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_41/41.md
ユーザー
 pjq123 (UID 86618)
送信2025年08月01日 04:35 (9 月 ago)
モデレーション2025年08月10日 10:06 (9 days later)
ステータス承諾済み
VulDBエントリ319359 [Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 迄 20250801 /goform/RP_setBasicAuto staticIp/staticNetmask 特権昇格]
ポイント19

Do you know our Splunk app?

Download it now for free!