top of page

Linksys E5600 Command Execution (CVE-2024-33788)



Application Details

Linksys E5600 is a dual-band WiFi5 router.


Vulnerability

Linksys E5600 could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a flaw via the PinCode parameter at /API/info form endpoint.


Identification

By sending a specially crafted request in the 'PinCode' parameter, an attacker could exploit this vulnerability to execute arbitrary commands in the runtime.wpsProcess function.


POST /API/info

PAYLOAD - 
{"wpsProcess": {"Mode": "PIN", "PinCode": "38316173`/usr/sbin/telnetd -l /bin/sh`"}}

Detection

By turning this into a traffic file and matching rule, we are able to detect attempts to execute arbitrary commands on the system.


Coverage

Idappcom have created signature 8024918 along with a traffic file for this vulnerability.


References


Traffic IQ

If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional

Commentaires

Les commentaires n'ont pas pu être chargés.
Il semble qu'un problème technique est survenu. Veuillez essayer de vous reconnecter ou d'actualiser la page.
bottom of page