8.3
CVSSv2

CVE-2017-16923

Published: 21/11/2017 Updated: 03/10/2019
CVSS v2 Base Score: 8.3 | Impact Score: 10 | Exploitability Score: 6.5
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 739
Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Command Injection vulnerability in app_data_center on Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01, Ac9 ac9_kf_V15.03.05.19(6318_)_cn, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01, and Ac18 ac18_kf_V15.03.05.19(6318_)_cn devices allows remote unauthenticated malicious users to execute arbitrary OS commands via a crafted cgi-bin/luci/usbeject?dev_name= GET request from the LAN. This occurs because the "sub_A6E8 usbeject_process_entry" function executes a system function with untrusted input.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tenda ac9_firmware us_ac9v1.0br_v15.03.05.14_multi_td01

tenda ac9_firmware ac9_kf_v15.03.05.19\\(6318_\\)_cn

tenda ac15_firmware us_ac15v1.0br_v15.03.05.18_multi_td01

tenda ac15_firmware us_ac15v1.0br_v15.03.05.19_multi_td01

tenda ac18_firmware us_ac18v1.0br_v15.03.05.05_multi_td01

tenda ac18_firmware ac18_kf_v15.03.05.19\\(6318_\\)_cn