vendor:
SmartRG SR510n
by:
Yerodin Richards
9.8
CVSS
CRITICAL
Remote Code Execution
78
CWE
Product Name: SmartRG SR510n
Affected Version From: 2.5.15
Affected Version To: 2.6.13
Patch Exists: YES
Related CWE: CVE-2022-37661
CPE: h:adtran:smartrg_sr510n
Platforms Tested: SR506n (2.5.15) & SR510n (2.6.13)
2022
SmartRG Router SR510n 2.6.13 – RCE (Remote Code Execution)
A vulnerability in SmartRG Router SR510n 2.6.13 allows an attacker to execute arbitrary code remotely. This is due to the lack of proper input validation in the pingHost.cmd page. An attacker can send a malicious payload to the router, which will be executed without any authentication. This can be exploited by sending a malicious payload to the router, which will be executed without any authentication.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should update their routers to the latest version.