CVE-2011-2716
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
03/07/2012
Last modified:
11/04/2025
Description
The DHCP client (udhcpc) in BusyBox before 1.20.0 allows remote DHCP servers to execute arbitrary commands via shell metacharacters in the (1) HOST_NAME, (2) DOMAIN_NAME, (3) NIS_DOMAIN, and (4) TFTP_SERVER_NAME host name options.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:t-mobile:tm-ac1900:3.0.0.4.376_3169:*:*:*:*:*:*:* | ||
| cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:* | 1.19.4 (including) | |
| cpe:2.3:a:busybox:busybox:0.60.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:busybox:busybox:1.00:*:*:*:*:*:*:* | ||
| cpe:2.3:a:busybox:busybox:1.0.0:pre1:*:*:*:*:*:* | ||
| cpe:2.3:a:busybox:busybox:1.0.0:pre10:*:*:*:*:*:* | ||
| cpe:2.3:a:busybox:busybox:1.0.0:pre2:*:*:*:*:*:* | ||
| cpe:2.3:a:busybox:busybox:1.0.0:pre3:*:*:*:*:*:* | ||
| cpe:2.3:a:busybox:busybox:1.0.0:pre4:*:*:*:*:*:* | ||
| cpe:2.3:a:busybox:busybox:1.0.0:pre5:*:*:*:*:*:* | ||
| cpe:2.3:a:busybox:busybox:1.0.0:pre6:*:*:*:*:*:* | ||
| cpe:2.3:a:busybox:busybox:1.0.0:pre7:*:*:*:*:*:* | ||
| cpe:2.3:a:busybox:busybox:1.0.0:pre8:*:*:*:*:*:* | ||
| cpe:2.3:a:busybox:busybox:1.0.0:pre9:*:*:*:*:*:* | ||
| cpe:2.3:a:busybox:busybox:1.0.0:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://downloads.avaya.com/css/P8/documents/100158840
- http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
- http://rhn.redhat.com/errata/RHSA-2012-0810.html
- http://seclists.org/fulldisclosure/2019/Jun/18
- http://seclists.org/fulldisclosure/2020/Aug/20
- http://secunia.com/advisories/45363
- http://www.busybox.net/news.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A129
- http://www.securityfocus.com/bid/48879
- https://bugs.busybox.net/show_bug.cgi?id=3979
- https://seclists.org/bugtraq/2019/Jun/14
- https://support.t-mobile.com/docs/DOC-21994
- http://downloads.avaya.com/css/P8/documents/100158840
- http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
- http://rhn.redhat.com/errata/RHSA-2012-0810.html
- http://seclists.org/fulldisclosure/2019/Jun/18
- http://seclists.org/fulldisclosure/2020/Aug/20
- http://secunia.com/advisories/45363
- http://www.busybox.net/news.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2012%3A129
- http://www.securityfocus.com/bid/48879
- https://bugs.busybox.net/show_bug.cgi?id=3979
- https://seclists.org/bugtraq/2019/Jun/14
- https://support.t-mobile.com/docs/DOC-21994



