You are here

U-218: Cisco Linksys WMB54G TFTP Command Injection Vulnerability

July 23, 2012 - 6:49am

Addthis

PROBLEM:

Cisco Linksys WMB54G TFTP Command Injection
Vulnerability

PLATFORM:

Cisco Linksys WMB54G 1.x

ABSTRACT:

System access from local network

referenceĀ  LINKS:

Bugtraq ID: 54615
Original Advisory
Secunia Advisory SA49868
Cisco Advisory ID: cisco-sa-20111019-cs

IMPACT ASSESSMENT:

Medium

Discussion:

A vulnerability in Cisco Linksys WMB54G was reported, which can be exploited by malicious people to compromise a vulnerable device. The vulnerability is caused due to missing input validation in the TFTP service when running the firmware update functionality and can be exploited to inject and execute arbitrary shell commands. Additionally, it may be possible to apply malicious firmware images uploaded via the TFTP service to the device.

The vulnerability is reported in version 1 running firmware version 2.18. Other versions may also be affected.

Impact:

Successful exploit allows an attacker to execute arbitrary commands with user privileges in context of the affected application.

Solution:

No official solution is currently available.

Addthis