Vulnerability Description
LINK-NET LW-N605R devices with firmware 12.20.2.1486 allow Remote Code Execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linknet-Usa | Lw-N605R Firmware | 12.20.2.1486 |
| Linknet-Usa | Lw-N605R | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/149297/LW-N605R-Remote-Code-Execution.htmlExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/45351/ExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/149297/LW-N605R-Remote-Code-Execution.htmlExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/45351/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2018-16752?
CVE-2018-16752 is a vulnerability with a CVSS score of 8.8 (HIGH). LINK-NET LW-N605R devices with firmware 12.20.2.1486 allow Remote Code Execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the de...
How severe is CVE-2018-16752?
CVE-2018-16752 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16752?
Check the references section above for vendor advisories and patch information. Affected products include: Linknet-Usa Lw-N605R Firmware, Linknet-Usa Lw-N605R.