Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 20 Aug 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linksys e1500
|
|
| CPEs | cpe:2.3:h:linksys:e1500:-:*:*:*:*:*:*:* cpe:2.3:o:linksys:e1500_firmware:1.0.06.001:*:*:*:*:*:*:* |
|
| Vendors & Products |
Linksys e1500
|
Tue, 20 Aug 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linksys
Linksys e1500 Firmware |
|
| Weaknesses | CWE-78 | |
| CPEs | cpe:2.3:o:linksys:e1500_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linksys
Linksys e1500 Firmware |
|
| Metrics |
cvssV3_1
|
Mon, 19 Aug 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Command Injection vulnerability exists in the do_upgrade_post function of the httpd binary in Linksys E1500 v1.0.06.001. As a result, an authenticated attacker can execute OS commands with root privileges. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-20T14:48:13.874Z
Reserved: 2024-08-05T00:00:00.000Z
Link: CVE-2024-42633
Updated: 2024-08-20T14:47:51.026Z
Status : Analyzed
Published: 2024-08-19T16:15:08.740
Modified: 2024-08-20T16:18:24.300
Link: CVE-2024-42633
No data.
OpenCVE Enrichment
No data.