First published: Thu Jun 20 2019(Updated: )
A shell injection issue in cosa_wifi_apis.c in the RDK RDKB-20181217-1 CcspWifiAgent module allows attackers with login credentials to execute arbitrary shell commands under the CcspWifiSsp process (running as root) if the platform was compiled with the ENABLE_FEATURE_MESHWIFI macro. The attack is conducted by changing the Wi-Fi network password to include crafted escape characters. This is related to the WebUI module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rdkcentral Rdkb Ccsppandm | =rdkb-20181217-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6962 is a shell injection issue in the CcspWifiAgent module in RDK RDKB-20181217-1 that allows attackers with login credentials to execute arbitrary shell commands.
CVE-2019-6962 has a severity rating of 7.5 (high).
CVE-2019-6962 allows attackers with login credentials to inject and execute arbitrary shell commands under the CcspWifiSsp process (running as root) in the RDKB-20181217-1 platform.
CVE-2019-6962 affects RDKB-20181217-1.
To fix CVE-2019-6962, it is recommended to update the affected software version to a version that addresses the shell injection issue.