An arbitrary code exection vulnerability exists in Linksys WUMC710 Wireless-AC Universal Media Connector with firmware <= 1.0.02 (build3). The do_setNTP function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious GET or POST request to /setNTP.cgi to execute arbitrary commands on the underlying Linux operating system as root.
2023-01-09T21:15:10.840
2024-11-21T07:27:27.293
Modified
CVSSv3.1: 7.2 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linksys | wumc710_firmware | < 1.0.02 | Yes |
Operating System | linksys | wumc710_firmware | 1.0.02 | Yes |
Operating System | linksys | wumc710_firmware | 1.0.02 | Yes |
Hardware | linksys | wumc710 | - | No |