First published: Wed Sep 19 2018(Updated: )
Linksys Velop 1.1.2.187020 devices allow unauthenticated command injection, providing an attacker with full root access, via cgi-bin/zbtest.cgi or cgi-bin/zbtest2.cgi (scripts that can be discovered with binwalk on the firmware, but are not visible in the web interface). This occurs because shell metacharacters in the query string are mishandled by ShellExecute, as demonstrated by the zbtest.cgi?cmd=level&level= substring. This can also be exploited via CSRF.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys Velop Firmware | =1.1.2.187020 | |
Linksys Velop |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-17208 is critical with a CVSS score of 8.8.
CVE-2018-17208 allows unauthenticated command injection, providing an attacker with full root access to Linksys Velop 1.1.2.187020 devices.
Linksys Velop Firmware version 1.1.2.187020 is affected by CVE-2018-17208.
An attacker can exploit CVE-2018-17208 by injecting commands via cgi-bin/zbtest.cgi or cgi-bin/zbtest2.cgi on the affected Linksys Velop firmware.
No, the Linksys Velop device itself is not vulnerable to CVE-2018-17208.