Command Injection vulnerability in app_data_center on Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01, Ac9 ac9_kf_V15.03.05.19(6318_)_cn, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01, and Ac18 ac18_kf_V15.03.05.19(6318_)_cn devices allows remote unauthenticated attackers to execute arbitrary OS commands via a crafted cgi-bin/luci/usbeject?dev_name= GET request from the LAN. This occurs because the "sub_A6E8 usbeject_process_entry" function executes a system function with untrusted input.
References
Link Resource
https://github.com/Iolop/Poc/tree/master/Router/Tenda Issue Tracking Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-10-03T16:23:23

Updated: 2022-10-03T16:23:23

Reserved: 2022-10-03T00:00:00


Link: CVE-2017-16923

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-11-21T14:29:00.260

Modified: 2019-10-03T00:03:26.223


Link: CVE-2017-16923

JSON object: View

cve-icon Redhat Information

No data.

CWE