10
CVSSv2

CVE-2020-35713

Published: 26/12/2020 Updated: 28/12/2020
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Belkin LINKSYS RE6500 devices prior to 1.0.012.001 allow remote malicious users to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linksys re6500_firmware

Github Repositories

CVE-2020-35713

Description Belkin LINKSYS RE6500 devices before 10012001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page How to use Step 1: Modify the IP address in cve-2020-35713py file to the target address Step 2: Run the cve-2020-35713py to change the password Step 3: login test