First published: Sun Mar 26 2023(Updated: )
LB-LINK BL-AC1900_2.0 v1.0.1, LB-LINK BL-WR9000 v2.4.9, LB-LINK BL-X26 v1.2.5, and LB-LINK BL-LTE300 v1.0.8 were discovered to contain a command injection vulnerability via the mac, time1, and time2 parameters at /goform/set_LimitClient_cfg.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
LB-LINK BL-LTE300 firmware | =1.0.8 | |
LB-LINK BL-LTE300 firmware | ||
All of | ||
LB-LINK BL-X26 firmware | =1.2.5 | |
LB-LINK BL-X26 firmware | ||
All of | ||
LB-LINK BL-WR9000 firmware | =2.4.9 | |
LB-LINK BL-WR9000 | ||
All of | ||
LB-LINK BL-AC1900 firmware | =1.0.1 | |
LB-LINK BL-AC1900 firmware | =2.0 | |
LB-LINK BL-LTE300 firmware | =1.0.8 | |
LB-LINK BL-LTE300 firmware | ||
LB-LINK BL-X26 firmware | =1.2.5 | |
LB-LINK BL-X26 firmware | ||
LB-LINK BL-WR9000 firmware | =2.4.9 | |
LB-LINK BL-WR9000 | ||
LB-LINK BL-AC1900 firmware | =1.0.1 | |
LB-LINK BL-AC1900 firmware | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-26801 is classified as a critical vulnerability due to its potential for command injection leading to unauthorized access.
To mitigate CVE-2023-26801, users should update their LB-LINK device firmware to the latest version provided by the manufacturer.
CVE-2023-26801 affects the LB-LINK BL-AC1900, BL-WR9000, BL-X26, and BL-LTE300 models running specific vulnerable firmware versions.
CVE-2023-26801 can be exploited for command injection attacks, potentially allowing an attacker to execute arbitrary commands on the affected device.
Yes, there are reports indicating that CVE-2023-26801 has been exploited in the wild, particularly in connection with Mirai botnet activities.