제출 #797086: Linksys MR9600 Firmware 2.0.6.206937 Command Injection정보

제목Linksys MR9600 Firmware 2.0.6.206937 Command Injection
설명An authenticated OS command injection vulnerability exists in Linksys MR9600 firmware 2.0.6.206937. The issue is reachable through the JNAP action BTRequestGetSmartConnectStatus. The user-controlled `pin` parameter is passed into `bluetooth.btGetSmartConnectStatus2(pin)`, then concatenated into `/etc/init.d/run_central2.sh`, where it is ultimately used in `/usr/bin/btsetup_central $OPTION` without proper quoting. This allows an authenticated attacker to inject arbitrary shell commands and achieve root command execution. The vulnerable code path requires the device to be in Master mode.
원천⚠️ https://github.com/utmost3/cve/issues/2
사용자
 wuuu (UID 93536)
제출2026. 04. 04. PM 12:37 (21 날 ago)
모더레이션2026. 04. 24. PM 09:40 (20 days later)
상태수락
VulDB 항목359544 [Linksys MR9600 2.0.6.206937 JNAP Action run_central2.sh BTRequestGetSmartConnectStatus pin 권한 상승]
포인트들20

Interested in the pricing of exploits?

See the underground prices here!