提出 #626695: Linksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection情報

タイトルLinksys RE6500、RE6250、RE6300、RE6350、RE7000、RE9000 RE6500(1.0.013.001) RE6250(1.0.04.001) RE6300(1.2.07.001) RE6350(1.0.04.001) RE7000(1.1.05.003) RE9000(1.0.04.002) OS Command Injection
説明We found an command Injection vulnerability in Linksys router with firmware which was released recently, allows remote attackers to execute arbitrary OS commands from a crafted request.In sub_3517C function, hostname is directly passed by the attacker, so we can control the hostname to attack the OS.
ソース⚠️ https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_46/46.md
ユーザー
 pjq123 (UID 86618)
送信2025年08月01日 04:39 (9 月 ago)
モデレーション2025年08月10日 10:06 (9 days later)
ステータス承諾済み
VulDBエントリ319364 [Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 迄 20250801 /goform/setWan sub_3517C ホスト名 特権昇格]
ポイント18

Want to stay up to date on a daily basis?

Enable the mail alert feature now!