First published: Mon May 22 2023(Updated: )
There is a command injection vulnerability in the Linksys WRT54GL router with firmware version 4.30.18.006. If an attacker gains web management privileges, they can inject commands into the post request parameters wl_ant, wl_rate, WL_atten_ctl, ttcp_num, ttcp_size in the httpd s Start_EPI() function, thereby gaining shell privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys Wrt54gl Firmware | =4.30.18.006 | |
Linksys WRT54GL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID for this vulnerability is CVE-2023-31742.
The affected software is Linksys Wrt54gl Firmware with version 4.30.18.006.
This vulnerability has a severity score of 7.2 (high).
This vulnerability allows an attacker with web management privileges to inject commands into certain post request parameters, which can result in command execution.
Currently, there is no official fix or patch available for this vulnerability.