Description
WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the adm.cgi binary's reboot_time function that allows unauthenticated remote attackers to execute arbitrary shell commands by injecting malicious input into the reboot_time POST parameter. Attackers can send a crafted request with shell metacharacters in the reboot_time parameter when reboot_enabled=1 to achieve remote code execution.
Problem types
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Any version
Credits
Matteo Strada
References
mstreet97.github.io/...aching_the_Machine_Where_to_Look.html
www.made-in-china.com/showroom/yeapook/
www.vulncheck.com/...mmand-injection-via-adm-cgi-reboot-time