Home

Description

An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.

PUBLISHED Reserved 2018-01-02 | Published 2019-05-06 | Updated 2025-12-12 | Assigner talos

Problem types

remote code execution

References

packetstormsecurity.com/...ad.cgi-Remote-Code-Execution.html

ics-cert.us-cert.gov/advisories/ICSA-19-122-03

www.securityfocus.com/bid/108147 (108147) vdb-entry

talosintelligence.com/vulnerability_reports/TALOS-2018-0748

packetstormsecurity.com/...ad.cgi-Remote-Code-Execution.html

ics-cert.us-cert.gov/advisories/ICSA-19-122-03

www.securityfocus.com/bid/108147 (108147) vdb-entry

talosintelligence.com/vulnerability_reports/TALOS-2018-0748

cve.org (CVE-2018-4063)

nvd.nist.gov (CVE-2018-4063)

Download JSON