CVE-2017-17411
high-risk
Published 2017-12-21
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.
Do I need to act?
!
92.2% chance of exploitation in next 30 days
EPSS score — higher than 8% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (10)
Third Party Advisory
http://www.securityfocus.com/bid/102212
Third Party Advisory
https://zerodayinitiative.com/advisories/ZDI-17-973
Third Party Advisory
http://www.securityfocus.com/bid/102212
Third Party Advisory
https://zerodayinitiative.com/advisories/ZDI-17-973
57
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
20/34 · Moderate
Exposure
5/34 · Minimal