CVE-2017-17411

CRITICAL EXPLOITED IN THE WILD

Linksys WVBR0 - RCE

Title source: llm

Description

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Linksys WVBR0. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management portal. The issue lies in the lack of proper validation of user data before executing a system call. An attacker could leverage this vulnerability to execute code with root privileges. Was ZDI-CAN-4892.

Exploits (3)

exploitdb WORKING POC
by Metasploit · rubyremotehardware
https://www.exploit-db.com/exploits/43429
exploitdb WORKING POC
by nixawk · pythonwebappshardware
https://www.exploit-db.com/exploits/43363
metasploit WORKING POC EXCELLENT
by HeadlessZeke · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/linksys_wvbr0_user_agent_exec_noauth.rb

Scores

CVSS v3 9.8
EPSS 0.9216
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2021-04-12
InTheWild.io 2021-04-12
CWE
CWE-78
Status published
Products (2)
Linksys/Linksys WVBR0 WVBR0
linksys/wvbr0_firmware < 1.0.41
Published Dec 21, 2017
Tracked Since Feb 18, 2026