First published: Mon May 06 2019(Updated: )
An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sierrawireless Airlink Es450 Firmware | =4.9.3 | |
Sierrawireless Airlink Es450 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4063 is an exploitable remote code execution vulnerability in the upload.cgi functionality of Sierra Wireless AirLink ES450 Firmware 4.9.3.
The severity of CVE-2018-4063 is critical with a CVSS score of 8.8.
The affected software for CVE-2018-4063 is Sierra Wireless AirLink ES450 Firmware 4.9.3.
CVE-2018-4063 can be exploited by using a specially crafted HTTP request to upload a file, resulting in executable code being uploaded to the webserver.
Yes, here are some references for CVE-2018-4063: [1](http://packetstormsecurity.com/files/152648/Sierra-Wireless-AirLink-ES450-ACEManager-upload.cgi-Remote-Code-Execution.html), [2](http://www.securityfocus.com/bid/108147), [3](https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03).