First published: Tue Nov 21 2017(Updated: )
Command Injection vulnerability in app_data_center on Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01, Ac9 ac9_kf_V15.03.05.19(6318_)_cn, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01, and Ac18 ac18_kf_V15.03.05.19(6318_)_cn devices allows remote unauthenticated attackers to execute arbitrary OS commands via a crafted cgi-bin/luci/usbeject?dev_name= GET request from the LAN. This occurs because the "sub_A6E8 usbeject_process_entry" function executes a system function with untrusted input.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda Ac9 Firmware | =us_ac9v1.0br_v15.03.05.14_multi_td01 | |
Tenda AC9 | ||
Tenda Ac9 Firmware | =ac9_kf_v15.03.05.19\(6318_\)_cn | |
Tenda ac15 firmware | =us_ac15v1.0br_v15.03.05.18_multi_td01 | |
Tenda AC15 | ||
Tenda ac15 firmware | =us_ac15v1.0br_v15.03.05.19_multi_td01 | |
Tenda Ac18 Firmware | =us_ac18v1.0br_v15.03.05.05_multi_td01 | |
Tenda AC18 | ||
Tenda Ac18 Firmware | =ac18_kf_v15.03.05.19\(6318_\)_cn |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16923 is a command injection vulnerability in the app_data_center on certain Tenda routers.
The following Tenda routers are affected: Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01, Ac9 ac9_kf_V15.03.05.19(6318_)_cn, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01, and Ac18 ac18_kf_V15.0…
CVE-2017-16923 has a severity rating of 8.8 (high).
To fix CVE-2017-16923, it is recommended to update the firmware of the affected Tenda router to a secure version.
If you have one of the affected Tenda router models and firmware versions mentioned in the vulnerability description, your router may be vulnerable.