First published: Tue Nov 30 2021(Updated: )
An issue was discovered on Victure WR1200 devices through 1.0.3. A command injection vulnerability was found within the web interface of the device, allowing an attacker with valid credentials to inject arbitrary shell commands to be executed by the device with root privileges. This occurs in the ping and traceroute features. An attacker would thus be able to use this vulnerability to open a reverse shell on the device with root privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Govicture WR1200 Firmware | <=1.0.3 | |
Greenpacket WR-1200 | ||
All of | ||
Govicture WR1200 Firmware | <=1.0.3 | |
Greenpacket WR-1200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Victure WR1200 devices through 1.0.3 is CVE-2021-43283.
The severity rating of CVE-2021-43283 is critical with a score of 8.8.
CVE-2021-43283 affects the Victure WR1200 devices through 1.0.3 by allowing an attacker with valid credentials to inject arbitrary shell commands with root privileges.
The recommended solution to fix CVE-2021-43283 is to update the firmware of the Victure WR1200 devices to a version that is not vulnerable.
You can find more information about CVE-2021-43283 in the technical advisory published by NCC Group at https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/.