Lucene search

K
cvelistTalosCVELIST:CVE-2018-3955
HistoryOct 17, 2018 - 2:00 a.m.

CVE-2018-3955

2018-10-1702:00:00
talos
www.cve.org
10

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

High

EPSS

0.002

Percentile

61.5%

An exploitable operating system command injection exists in the Linksys ESeries line of routers (Linksys E1200 Firmware Version 2.0.09 and Linksys E2500 Firmware Version 3.0.04). Specially crafted entries to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send an authenticated HTTP request to trigger this vulnerability. Data entered into the ‘Domain Name’ input field through the web portal is submitted to apply.cgi as the value to the ‘wan_domain’ POST parameter. The wan_domain data goes through the nvram_set process described above. When the ‘preinit’ binary receives the SIGHUP signal it enters a code path that calls a function named ‘set_host_domain_name’ from its libshared.so shared object.

CNA Affected

[
  {
    "product": "ESeries E1200",
    "vendor": "Linksys",
    "versions": [
      {
        "status": "affected",
        "version": "Firmware Version 2.0.09"
      }
    ]
  },
  {
    "product": "ESeries E2500",
    "vendor": "Linksys",
    "versions": [
      {
        "status": "affected",
        "version": "Firmware Version 3.0.04"
      }
    ]
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

AI Score

7.3

Confidence

High

EPSS

0.002

Percentile

61.5%