Description
Unsanitized user input in the web interface for Linksys WiFi extender products (RE6400 and RE6300 through 1.2.04.022) allows for remote command execution. An attacker can access system OS configurations and commands that are not intended for use beyond the web UI.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-3206 | Unsanitized user input in the web interface for Linksys WiFi extender products (RE6400 and RE6300 through 1.2.04.022) allows for remote command execution. An attacker can access system OS configurations and commands that are not intended for use beyond the web UI. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T22:55:40.673Z
Reserved: 2019-04-25T00:00:00.000Z
Link: CVE-2019-11535
No data.
Status : Modified
Published: 2019-07-17T20:15:10.897
Modified: 2024-11-21T04:21:17.377
Link: CVE-2019-11535
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD