ID CVE-2018-16752
Summary LINK-NET LW-N605R devices with firmware 12.20.2.1486 allow Remote Code Execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.
References
Vulnerable Configurations
  • cpe:2.3:o:linknet-usa:lw-n605r_firmware:12.20.2.1486:*:*:*:*:*:*:*
    cpe:2.3:o:linknet-usa:lw-n605r_firmware:12.20.2.1486:*:*:*:*:*:*:*
  • cpe:2.3:h:linknet-usa:lw-n605r:-:*:*:*:*:*:*:*
    cpe:2.3:h:linknet-usa:lw-n605r:-:*:*:*:*:*:*:*
CVSS
Base: 9.0 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE CWE-1188
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:S/C:C/I:C/A:C
refmap via4
exploit-db 45351
misc http://packetstormsecurity.com/files/149297/LW-N605R-Remote-Code-Execution.html
Last major update 03-10-2019 - 00:03
Published 20-09-2018 - 20:29
Last modified 03-10-2019 - 00:03
Back to Top