|Category:||Web application abuses|
|Title:||Linksys ESeries Multiple OS Command Injection Vulnerabilities|
|Summary:||Linksys ESeries are prone to multiple authenticated OS command execution;vulnerabilities.|
Linksys ESeries are prone to multiple authenticated OS command execution
Specially crafted entries to network configuration information can cause
execution of arbitrary system commands, resulting in full control of the device. An attacker can send an
authenticated HTTP request to trigger this vulnerability.
Linksys E1200 and E2500.
Update to firmware version 2.0.10 (E1200), 3.0.05 (E2500) or later.
Common Vulnerability Exposure (CVE) ID: CVE-2018-3953|
Common Vulnerability Exposure (CVE) ID: CVE-2018-3954
Common Vulnerability Exposure (CVE) ID: CVE-2018-3955
|Copyright||This script is Copyright (C) 2018 Greenbone Networks GmbH|
|This is only one of 73533 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.