First published: Mon Aug 19 2024(Updated: )
A Command Injection vulnerability exists in the do_upgrade_post function of the httpd binary in Linksys E1500 v1.0.06.001. As a result, an authenticated attacker can execute OS commands with root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Linksys E1500 | =1.0.06.001 | |
Linksys E1500 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42633 is classified as a high severity vulnerability due to the potential for authenticated attackers to execute OS commands with root privileges.
To fix CVE-2024-42633, update the Linksys E1500 firmware to a version that addresses this command injection vulnerability.
CVE-2024-42633 affects users of the Linksys E1500 router running firmware version 1.0.06.001.
CVE-2024-42633 is a command injection vulnerability found in the httpd binary of the Linksys E1500 router.
An attacker leveraging CVE-2024-42633 can execute arbitrary OS commands on the Linksys E1500 router, potentially compromising the device and connected networks.