ID

VAR-E-200905-0934


TITLE

Linksys WAG54G2 Web Management Console Remote Arbitrary Shell Command Injection Vulnerability

Trust: 0.3

sources: BID: 35142

DESCRIPTION

Linksys WAG54G2 router is prone to a remote command-injection vulnerability because it fails to adequately sanitize user-supplied input data.
Remote attackers can exploit this issue to execute arbitrary shell commands with superuser privileges. This may facilitate a complete compromise of the affected device.
Linksys WAG54G2 with firmware V1.00.10 is affected; other versions may also be vulnerable.
UPDATE (May 29, 2009): The reporter indicates that this issue may not be remotely exploitable if the administrator credentials have been changed from the default values.

Trust: 0.3

sources: BID: 35142

AFFECTED PRODUCTS

vendor:linksysmodel:wireless-g adsl2+ gateway wag54g2scope:eqversion:1.0.10

Trust: 0.3

sources: BID: 35142

EXPLOIT

To exploit these issues, attackers may use a browser or readily available network utilities.
The following proof of concept is available:
Bullet list:
<li><a href="/data/vulnerabilities/exploits/35142.txt">/data/vulnerabilities/exploits/35142.txt</a></li>

Trust: 0.3

sources: BID: 35142

PRICE

Free

Trust: 0.3

sources: BID: 35142

TYPE

Input Validation Error

Trust: 0.3

sources: BID: 35142

CREDITS

Michal Sajdak

Trust: 0.3

sources: BID: 35142

EXTERNAL IDS

db:BIDid:35142

Trust: 0.3

sources: BID: 35142

REFERENCES

url:http://www.linksysbycisco.com/anz/en/products/wag54g2

Trust: 0.3

url:http://www.securitum.pl/dh/linksys_wag54g2_-_escape_to_os_root

Trust: 0.3

sources: BID: 35142

SOURCES

db:BIDid:35142

LAST UPDATE DATE

2022-07-27T09:55:07.318000+00:00


SOURCES UPDATE DATE

db:BIDid:35142date:2009-06-01T16:29:00

SOURCES RELEASE DATE

db:BIDid:35142date:2009-05-15T00:00:00