CVE-2017-17411
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
21/12/2017
Last modified:
20/04/2025
Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linksys:wvbr0_firmware:*:*:*:*:*:*:*:* | 1.0.41 (excluding) | |
cpe:2.3:h:linksys:wvbr0:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/102212
- https://github.com/rapid7/metasploit-framework/pull/9336
- https://www.exploit-db.com/exploits/43363/
- https://www.exploit-db.com/exploits/43429/
- https://zerodayinitiative.com/advisories/ZDI-17-973
- http://www.securityfocus.com/bid/102212
- https://github.com/rapid7/metasploit-framework/pull/9336
- https://www.exploit-db.com/exploits/43363/
- https://www.exploit-db.com/exploits/43429/
- https://zerodayinitiative.com/advisories/ZDI-17-973