提出 #626694: Linksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 OS Command Injection情報

タイトルLinksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 OS Command Injection
説明We found an command Injection vulnerability in Linksys router with firmware which was released recently, allows remote attackers to execute arbitrary OS commands from a crafted request.In um_red, hname is directly passed by the attacker, so we can control the hname to attack the OS.
ソース⚠️ https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_45/45.md
ユーザー
 pjq123 (UID 86618)
送信2025年08月01日 04:37 (9 月 ago)
モデレーション2025年08月10日 10:06 (9 days later)
ステータス承諾済み
VulDBエントリ319363 [Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 迄 20250801 /goform/RP_setBasicAuto um_red hname 特権昇格]
ポイント18

Might our Artificial Intelligence support you?

Check our Alexa App!