Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-57536 (GCVE-0-2024-57536)
Vulnerability from cvelistv5 – Published: 2025-01-21 00:00 – Updated: 2025-01-22 20:28- n/a
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-57536",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-22T20:27:50.643538Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-22T20:28:37.848Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via wizard_status."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-21T20:29:21.838Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-57536",
"datePublished": "2025-01-21T00:00:00.000Z",
"dateReserved": "2025-01-09T00:00:00.000Z",
"dateUpdated": "2025-01-22T20:28:37.848Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-57536",
"date": "2026-05-19",
"epss": "0.00961",
"percentile": "0.76707"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-57536\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2025-01-21T21:15:11.563\",\"lastModified\":\"2025-04-22T14:11:56.087\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via wizard_status.\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 que Linksys E8450 v1.2.00.360516 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s de wizard_status.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.1,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-77\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linksys:e8450_firmware:1.2.00.360516:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDF62C66-AF67-4A60-A41E-77C0FB526D53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:linksys:e8450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFEF3B59-D5D1-4234-9925-FCB53E45AC1A\"}]}]}],\"references\":[{\"url\":\"https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-57536\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-22T20:27:50.643538Z\"}}}], \"references\": [{\"url\": \"https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md\", \"tags\": [\"exploit\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-77\", \"description\": \"CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-22T20:28:22.086Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via wizard_status.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2025-01-21T20:29:21.838Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-57536\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-22T20:28:37.848Z\", \"dateReserved\": \"2025-01-09T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2025-01-21T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2024-57536
Vulnerability from fkie_nvd - Published: 2025-01-21 21:15 - Updated: 2025-04-22 14:11| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md | Exploit, Third Party Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md | Exploit, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| linksys | e8450_firmware | 1.2.00.360516 | |
| linksys | e8450 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linksys:e8450_firmware:1.2.00.360516:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF62C66-AF67-4A60-A41E-77C0FB526D53",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:linksys:e8450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEF3B59-D5D1-4234-9925-FCB53E45AC1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via wizard_status."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Linksys E8450 v1.2.00.360516 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos a trav\u00e9s de wizard_status."
}
],
"id": "CVE-2024-57536",
"lastModified": "2025-04-22T14:11:56.087",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-01-21T21:15:11.563",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-485C-PRHH-35P4
Vulnerability from github – Published: 2025-01-21 21:30 – Updated: 2025-01-22 21:30Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via wizard_status.
{
"affected": [],
"aliases": [
"CVE-2024-57536"
],
"database_specific": {
"cwe_ids": [
"CWE-77"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-21T21:15:11Z",
"severity": "HIGH"
},
"details": "Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via wizard_status.",
"id": "GHSA-485c-prhh-35p4",
"modified": "2025-01-22T21:30:55Z",
"published": "2025-01-21T21:30:54Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57536"
},
{
"type": "WEB",
"url": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-0158
Vulnerability from csaf_certbund - Published: 2025-01-21 23:00 - Updated: 2025-01-21 23:00Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgemäße Längenüberprüfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem führt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen oder einen Denial-of-Service-Zustand zu erzeugen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Linksys Router E8450 v1.2.00.360516
Linksys / Router
|
cpe:/h:linksys:router:e8450_v1.2.00.360516
|
E8450 v1.2.00.360516 |
Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgemäße Längenüberprüfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem führt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen oder einen Denial-of-Service-Zustand zu erzeugen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Linksys Router E8450 v1.2.00.360516
Linksys / Router
|
cpe:/h:linksys:router:e8450_v1.2.00.360516
|
E8450 v1.2.00.360516 |
Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgemäße Längenüberprüfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem führt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen oder einen Denial-of-Service-Zustand zu erzeugen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Linksys Router E8450 v1.2.00.360516
Linksys / Router
|
cpe:/h:linksys:router:e8450_v1.2.00.360516
|
E8450 v1.2.00.360516 |
Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgemäße Längenüberprüfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem führt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen oder einen Denial-of-Service-Zustand zu erzeugen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Linksys Router E8450 v1.2.00.360516
Linksys / Router
|
cpe:/h:linksys:router:e8450_v1.2.00.360516
|
E8450 v1.2.00.360516 |
Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgemäße Längenüberprüfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem führt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen oder einen Denial-of-Service-Zustand zu erzeugen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Linksys Router E8450 v1.2.00.360516
Linksys / Router
|
cpe:/h:linksys:router:e8450_v1.2.00.360516
|
E8450 v1.2.00.360516 |
Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgemäße Längenüberprüfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem führt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen oder einen Denial-of-Service-Zustand zu erzeugen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Linksys Router E8450 v1.2.00.360516
Linksys / Router
|
cpe:/h:linksys:router:e8450_v1.2.00.360516
|
E8450 v1.2.00.360516 |
Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgemäße Längenüberprüfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem führt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen oder einen Denial-of-Service-Zustand zu erzeugen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Linksys Router E8450 v1.2.00.360516
Linksys / Router
|
cpe:/h:linksys:router:e8450_v1.2.00.360516
|
E8450 v1.2.00.360516 |
Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgemäße Längenüberprüfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem führt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen oder einen Denial-of-Service-Zustand zu erzeugen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Linksys Router E8450 v1.2.00.360516
Linksys / Router
|
cpe:/h:linksys:router:e8450_v1.2.00.360516
|
E8450 v1.2.00.360516 |
Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgemäße Längenüberprüfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem führt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen oder einen Denial-of-Service-Zustand zu erzeugen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Linksys Router E8450 v1.2.00.360516
Linksys / Router
|
cpe:/h:linksys:router:e8450_v1.2.00.360516
|
E8450 v1.2.00.360516 |
Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgemäße Längenüberprüfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem führt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuführen oder einen Denial-of-Service-Zustand zu erzeugen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Linksys Router E8450 v1.2.00.360516
Linksys / Router
|
cpe:/h:linksys:router:e8450_v1.2.00.360516
|
E8450 v1.2.00.360516 |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Router der Firma Linksys enthalten eine Firewall und in der Regel eine WLAN-Schnittstelle. Die Ger\u00e4te sind haupts\u00e4chlich f\u00fcr private Anwender und Kleinunternehmen konzipiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Linksys Router ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial-of-Service-Zustand zu erzeugen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0158 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0158.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0158 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0158"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2025-01-21",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57545"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2025-01-21",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57544"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2025-01-21",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57543"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2025-01-21",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57542"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2025-01-21",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57541"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2025-01-21",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57540"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2025-01-21",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57539"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2025-01-21",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57538"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2025-01-21",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57537"
},
{
"category": "external",
"summary": "NIST Vulnerability Database vom 2025-01-21",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57536"
}
],
"source_lang": "en-US",
"title": "Linksys Router: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-01-21T23:00:00.000+00:00",
"generator": {
"date": "2025-01-22T12:43:49.608+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2025-0158",
"initial_release_date": "2025-01-21T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "E8450 v1.2.00.360516",
"product": {
"name": "Linksys Router E8450 v1.2.00.360516",
"product_id": "T040546",
"product_identification_helper": {
"cpe": "cpe:/h:linksys:router:e8450_v1.2.00.360516"
}
}
}
],
"category": "product_name",
"name": "Router"
}
],
"category": "vendor",
"name": "Linksys"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57536",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgem\u00e4\u00dfe L\u00e4ngen\u00fcberpr\u00fcfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem f\u00fchrt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"T040546"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-57536"
},
{
"cve": "CVE-2024-57537",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgem\u00e4\u00dfe L\u00e4ngen\u00fcberpr\u00fcfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem f\u00fchrt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"T040546"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-57537"
},
{
"cve": "CVE-2024-57538",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgem\u00e4\u00dfe L\u00e4ngen\u00fcberpr\u00fcfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem f\u00fchrt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"T040546"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-57538"
},
{
"cve": "CVE-2024-57539",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgem\u00e4\u00dfe L\u00e4ngen\u00fcberpr\u00fcfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem f\u00fchrt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"T040546"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-57539"
},
{
"cve": "CVE-2024-57540",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgem\u00e4\u00dfe L\u00e4ngen\u00fcberpr\u00fcfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem f\u00fchrt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"T040546"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-57540"
},
{
"cve": "CVE-2024-57541",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgem\u00e4\u00dfe L\u00e4ngen\u00fcberpr\u00fcfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem f\u00fchrt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"T040546"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-57541"
},
{
"cve": "CVE-2024-57542",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgem\u00e4\u00dfe L\u00e4ngen\u00fcberpr\u00fcfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem f\u00fchrt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"T040546"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-57542"
},
{
"cve": "CVE-2024-57543",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgem\u00e4\u00dfe L\u00e4ngen\u00fcberpr\u00fcfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem f\u00fchrt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"T040546"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-57543"
},
{
"cve": "CVE-2024-57544",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgem\u00e4\u00dfe L\u00e4ngen\u00fcberpr\u00fcfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem f\u00fchrt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"T040546"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-57544"
},
{
"cve": "CVE-2024-57545",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in Linksys Router. Diese Schwachstellen betreffen mehrere geparste Felder, da sie ohne ordnungsgem\u00e4\u00dfe L\u00e4ngen\u00fcberpr\u00fcfung in den Stack kopiert werden, was zu einem Buffer Overflow oder einem Command Injection Problem f\u00fchrt. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren oder einen Denial-of-Service-Zustand zu erzeugen."
}
],
"product_status": {
"known_affected": [
"T040546"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-57545"
}
]
}
CNVD-2025-02897
Vulnerability from cnvd - Published: 2025-02-13厂商已发布了漏洞修复程序,请及时关注更新: https://support.linksys.com/kb/article/504-en/
| Name | Linksys E8450 v1.2.00.360516 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2024-57536",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2024-57536"
}
},
"description": "Linksys E8450\u662f\u7f8e\u56fdLinksys\u516c\u53f8\u7684\u4e00\u6b3e\u8def\u7531\u5668\u3002\n\nLinksys E8450 v1.2.00.360516\u7248\u672c\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8ewizard_status\u672a\u80fd\u6b63\u786e\u8fc7\u6ee4\u6784\u9020\u547d\u4ee4\u7279\u6b8a\u5b57\u7b26\u3001\u547d\u4ee4\u7b49\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u4efb\u610f\u547d\u4ee4\u6267\u884c\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://support.linksys.com/kb/article/504-en/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-02897",
"openTime": "2025-02-13",
"patchDescription": "Linksys E8450\u662f\u7f8e\u56fdLinksys\u516c\u53f8\u7684\u4e00\u6b3e\u8def\u7531\u5668\u3002\r\n\r\nLinksys E8450 v1.2.00.360516\u7248\u672c\u5b58\u5728\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8ewizard_status\u672a\u80fd\u6b63\u786e\u8fc7\u6ee4\u6784\u9020\u547d\u4ee4\u7279\u6b8a\u5b57\u7b26\u3001\u547d\u4ee4\u7b49\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u4efb\u610f\u547d\u4ee4\u6267\u884c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linksys E8450 wizard_status\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Linksys E8450 v1.2.00.360516"
},
"referenceLink": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md",
"serverity": "\u9ad8",
"submitTime": "2025-01-24",
"title": "Linksys E8450 wizard_status\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e"
}
BDU:2025-01802
Vulnerability from fstec - Published: 26.12.2024{
"CVSS 2.0": "AV:A/AC:L/Au:S/C:C/I:C/A:C",
"CVSS 3.0": "AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Linksys Holdings, Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.2.00.360516 (E8450)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c;\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438\u0437 \u0432\u043d\u0435\u0448\u043d\u0438\u0445 \u0441\u0435\u0442\u0435\u0439 (\u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442);\n- \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435/\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0437\u0430\u043f\u0440\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0435\u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a HTTP \u0438\u043b\u0438 Telnet);\n- \u0441\u043e\u0431\u043b\u044e\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u0440\u043e\u043b\u044c\u043d\u043e\u0439 \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0438 \u043f\u0440\u0438\u043d\u044f\u0442\u043e\u0439 \u0434\u043b\u044f \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443;\n- \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0435\u0442\u0438 \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 (IDS/IPS) \u0434\u043b\u044f \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0447\u0430\u0441\u0442\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u0434\u043b\u044f \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (VPN).",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "26.12.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "19.02.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "19.02.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-01802",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-57536",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "E8450",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 sub_422eb8() \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Wi-Fi \u0440\u043e\u0443\u0442\u0435\u0440\u043e\u0432 Linksys E8450, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u0435 \u043c\u0435\u0440 \u043f\u043e \u0447\u0438\u0441\u0442\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u043d\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u043c \u0443\u0440\u043e\u0432\u043d\u0435 (\u0412\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u0443) (CWE-77)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 sub_422eb8() \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Wi-Fi \u0440\u043e\u0443\u0442\u0435\u0440\u043e\u0432 Linksys E8450 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u0435\u043c \u043c\u0435\u0440 \u043f\u043e \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u043e\u0432, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430 wizard_status. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u043d\u044a\u0435\u043a\u0446\u0438\u044f",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/Wood1314/Linksys_E8450_vul/blob/main/8/8.md",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c",
"\u0422\u0438\u043f \u041f\u041e": "\u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-77",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,7)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8)"
}
VAR-202501-3381
Vulnerability from variot - Updated: 2025-04-25 01:46Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via wizard_status. (DoS) It may be in a state. Linksys E8450 is a router from Linksys, an American company. Attackers can exploit this vulnerability to cause arbitrary command execution
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202501-3381",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "e8450",
"scope": "eq",
"trust": 1.0,
"vendor": "linksys",
"version": "1.2.00.360516"
},
{
"model": "e8450",
"scope": "eq",
"trust": 0.8,
"vendor": "linksys",
"version": null
},
{
"model": "e8450",
"scope": "eq",
"trust": 0.8,
"vendor": "linksys",
"version": "e8450 firmware 1.2.00.360516"
},
{
"model": "e8450",
"scope": null,
"trust": 0.8,
"vendor": "linksys",
"version": null
},
{
"model": "e8450",
"scope": "eq",
"trust": 0.6,
"vendor": "linksys",
"version": "v1.2.00.360516"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-02897"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-003877"
},
{
"db": "NVD",
"id": "CVE-2024-57536"
}
]
},
"cve": "CVE-2024-57536",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.7,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 5.1,
"id": "CNVD-2025-02897",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT",
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.1,
"id": "CVE-2024-57536",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Adjacent Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 8.0,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2025-003877",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2024-57536",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "OTHER",
"id": "JVNDB-2025-003877",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2025-02897",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-02897"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-003877"
},
{
"db": "NVD",
"id": "CVE-2024-57536"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Linksys E8450 v1.2.00.360516 was discovered to contain a command injection vulnerability via wizard_status. (DoS) It may be in a state. Linksys E8450 is a router from Linksys, an American company. Attackers can exploit this vulnerability to cause arbitrary command execution",
"sources": [
{
"db": "NVD",
"id": "CVE-2024-57536"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-003877"
},
{
"db": "CNVD",
"id": "CNVD-2025-02897"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2024-57536",
"trust": 3.2
},
{
"db": "JVNDB",
"id": "JVNDB-2025-003877",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2025-02897",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-02897"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-003877"
},
{
"db": "NVD",
"id": "CVE-2024-57536"
}
]
},
"id": "VAR-202501-3381",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-02897"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-02897"
}
]
},
"last_update_date": "2025-04-25T01:46:13.296000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Linksys E8450 wizard_status command injection vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/655951"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-02897"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-77",
"trust": 1.0
},
{
"problemtype": "Command injection (CWE-77) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-003877"
},
{
"db": "NVD",
"id": "CVE-2024-57536"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "https://github.com/wood1314/linksys_e8450_vul/blob/main/8/8.md"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2024-57536"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-02897"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-003877"
},
{
"db": "NVD",
"id": "CVE-2024-57536"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2025-02897"
},
{
"db": "JVNDB",
"id": "JVNDB-2025-003877"
},
{
"db": "NVD",
"id": "CVE-2024-57536"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-02-13T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-02897"
},
{
"date": "2025-04-23T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2025-003877"
},
{
"date": "2025-01-21T21:15:11.563000",
"db": "NVD",
"id": "CVE-2024-57536"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-02-14T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-02897"
},
{
"date": "2025-04-23T03:19:00",
"db": "JVNDB",
"id": "JVNDB-2025-003877"
},
{
"date": "2025-04-22T14:11:56.087000",
"db": "NVD",
"id": "CVE-2024-57536"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Linksys\u00a0 of \u00a0e8450\u00a0 Command injection vulnerability in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2025-003877"
}
],
"trust": 0.8
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.