First published: Tue Jun 11 2019(Updated: )
On Linksys WAG54G2 1.00.10 devices, there is authenticated command injection via shell metacharacters in the setup.cgi c4_ping_ipaddr variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys Wag54g2 Firmware | =1.00.10 | |
Linksys WAG54G2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-5157 is high with a score of 8.8.
To fix CVE-2009-5157, you need to update the firmware of your Linksys WAG54G2 device to the latest version.
Authenticated command injection in CVE-2009-5157 occurs through the use of shell metacharacters in the setup.cgi c4_ping_ipaddr variable.
The specific version affected by CVE-2009-5157 is Linksys WAG54G2 1.00.10.
You can find more information about CVE-2009-5157 on the securityfocus.com website. Here are the links: [1](https://www.securityfocus.com/bid/35142) and [2](https://www.securityfocus.com/archive/1/503934).