1. EXECUTIVE SUMMARY
- CVSS v3 8.0
- ATTENTION: Exploitable remotely/low attack complexity/public exploits are available/known public exploitation
- Vendor: FXC
- Equipment: AE1021, AE1021PE
- Vulnerability: OS Command Injection
2. RISK EVALUATION
Successful exploitation of this vulnerability could allow an attacker to achieve remote code execution on the device via NTP server settings.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following versions of FXC AE1021, a wireless LAN router, are affected:
- AE1021PE firmware: version 2.0.9 and earlier
- AE1021 firmware: version 2.0.9 and earlier
3.2 Vulnerability Overview
3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND (‘OS COMMAND INJECTION’) CWE-78
FXC AE1021/AE1021PE versions 2.0.9 and prior are vulnerable to a code injection that could allow an authenticated user to achieve remote code execution via NTP server settings.
CVE-2023-49897 has been assigned to this vulnerability. A CVSS v3.1 base score of 8.0 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
3.3 BACKGROUND
- CRITICAL INFRASTRUCTURE SECTORS: Information Technology, Commercial Facilities
- COUNTRIES/AREAS DEPLOYED: Japan
- COMPANY HEADQUARTERS LOCATION: Japan
3.4 RESEARCHER
Ryu Kuki, Takayuki Sasaki, and Katsunari Yoshioka of Yokohama National University reported this vulnerability to JPCERT/CC.
Chad Seaman and Larry Cashdollar of Akamai Technologies reported this vulnerability to CISA.
4. MITIGATIONS
FXC released the following versions to address this vulner
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: