Vulnerability Description
On Cisco DDR2200 ADSL2+ Residential Gateway DDR2200B-NA-AnnexA-FCC-V00.00.03.45.4E and DDR2201v1 ADSL2+ Residential Gateway DDR2201v1-NA-AnnexA-FCC-V00.00.03.28.3 devices, there is remote command execution via shell metacharacters in the pingAddr parameter to the waitPingqry.cgi URI. The command output is visible at /PingMsg.cmd.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Residential Gateway Firmware | ddr2200b-na-annexa-fcc-v00.00.03.45.4e |
| Cisco | Residential Gateway | - |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2017/Jul/26Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/99963Third Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2017/Jul/26Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/99963Third Party AdvisoryVDB Entry
FAQ
What is CVE-2017-11588?
CVE-2017-11588 is a vulnerability with a CVSS score of 9.8 (CRITICAL). On Cisco DDR2200 ADSL2+ Residential Gateway DDR2200B-NA-AnnexA-FCC-V00.00.03.45.4E and DDR2201v1 ADSL2+ Residential Gateway DDR2201v1-NA-AnnexA-FCC-V00.00.03.28.3 devices, there is remote command exec...
How severe is CVE-2017-11588?
CVE-2017-11588 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-11588?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Residential Gateway Firmware, Cisco Residential Gateway.