Vulnerability Description
There is a command injection vulnerability in the Linksys E2000 router with firmware version 1.0.06. If an attacker gains web management privileges, they can inject commands into the post request parameters wl_ssid, wl_ant, wl_rate, WL_atten_ctl, ttcp_num, ttcp_size in the httpd s Start_EPI() function, thereby gaining shell privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linksys | E2000 Firmware | 1.0.06 |
| Linksys | E2000 | - |
Related Weaknesses (CWE)
References
- http://linksys.comProduct
- https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31741/Linksys_E2000_RCE_ExploitMitigationThird Party Advisory
- http://linksys.comProduct
- https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31741/Linksys_E2000_RCE_ExploitMitigationThird Party Advisory
FAQ
What is CVE-2023-31741?
CVE-2023-31741 is a vulnerability with a CVSS score of 7.2 (HIGH). There is a command injection vulnerability in the Linksys E2000 router with firmware version 1.0.06. If an attacker gains web management privileges, they can inject commands into the post request para...
How severe is CVE-2023-31741?
CVE-2023-31741 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-31741?
Check the references section above for vendor advisories and patch information. Affected products include: Linksys E2000 Firmware, Linksys E2000.