First published: Wed Oct 17 2018(Updated: )
Devices in the Linksys ESeries line of routers (Linksys E1200 Firmware Version 2.0.09 and Linksys E2500 Firmware Version 3.0.04) are susceptible to OS command injection vulnerabilities due to improper filtering of data passed to and retrieved from NVRAMData entered into the 'Router Name' input field through the web portal is submitted to apply.cgi as the value to the 'machine_name' POST parameter. When the 'preinit' binary receives the SIGHUP signal it enters a code path that calls a function named 'set_host_domain_name' from its libshared.so shared object.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys E1200 Firmware | =2.0.09 | |
Linksys E1200 | ||
Linksys E2500 Firmware | =3.0.04 | |
Linksys E2500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3954 is a vulnerability in the Linksys ESeries line of routers that allows for OS command injection.
Devices in the Linksys ESeries line of routers, specifically Linksys E1200 (Firmware Version 2.0.09) and Linksys E2500 (Firmware Version 3.0.04), are affected by CVE-2018-3954.
CVE-2018-3954 has a severity rating of 7.2 out of 10, making it a critical vulnerability.
To fix CVE-2018-3954, it is recommended to update the firmware of affected devices to a version that addresses the vulnerability.
You can find more information about CVE-2018-3954 at https://talosintelligence.com/vulnerability_reports/TALOS-2018-0625.