First published: Wed Jun 19 2019(Updated: )
Western Digital WD My Book Live and WD My Book Live Duo (all versions) have a root Remote Command Execution bug via shell metacharacters in the /api/1.0/rest/language_configuration language parameter. It can be triggered by anyone who knows the IP address of the affected device, as exploited in the wild in June 2021 for factory reset commands,
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Westerndigital My Book Live Firmware | ||
Westerndigital My Book Live |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18472 is considered a critical vulnerability due to its potential for remote command execution.
To fix CVE-2018-18472, it is advised to disable remote access on the affected WD My Book Live devices.
All versions of WD My Book Live and WD My Book Live Duo are affected by CVE-2018-18472.
CVE-2018-18472 is classified as a root Remote Command Execution vulnerability.
Yes, CVE-2018-18472 can be exploited remotely by anyone who knows the IP address of the affected device.