Description
Unsanitized user input in the web interface for Linksys WiFi extender products (RE6400 and RE6300 through 1.2.04.022) allows for remote command execution. An attacker can access system OS configurations and commands that are not intended for use beyond the web UI.
Published: 2019-07-17
Score: 9.8 Critical
EPSS: 3.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-3206 Unsanitized user input in the web interface for Linksys WiFi extender products (RE6400 and RE6300 through 1.2.04.022) allows for remote command execution. An attacker can access system OS configurations and commands that are not intended for use beyond the web UI.
History

No history.

Subscriptions

Linksys Re6300 Re6300 Firmware Re6400 Re6400 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T22:55:40.673Z

Reserved: 2019-04-25T00:00:00.000Z

Link: CVE-2019-11535

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-17T20:15:10.897

Modified: 2024-11-21T04:21:17.377

Link: CVE-2019-11535

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses