提交 #797086: Linksys MR9600 Firmware 2.0.6.206937 Command Injection信息

标题Linksys MR9600 Firmware 2.0.6.206937 Command Injection
描述An authenticated OS command injection vulnerability exists in Linksys MR9600 firmware 2.0.6.206937. The issue is reachable through the JNAP action BTRequestGetSmartConnectStatus. The user-controlled `pin` parameter is passed into `bluetooth.btGetSmartConnectStatus2(pin)`, then concatenated into `/etc/init.d/run_central2.sh`, where it is ultimately used in `/usr/bin/btsetup_central $OPTION` without proper quoting. This allows an authenticated attacker to inject arbitrary shell commands and achieve root command execution. The vulnerable code path requires the device to be in Master mode.
来源⚠️ https://github.com/utmost3/cve/issues/2
用户
 wuuu (UID 93536)
提交2026-04-04 12時37分 (22 日前)
管理2026-04-24 21時40分 (20 days later)
状态已接受
VulDB条目359544 [Linksys MR9600 2.0.6.206937 JNAP Action run_central2.sh BTRequestGetSmartConnectStatus pin 权限提升]
积分20

Might our Artificial Intelligence support you?

Check our Alexa App!