Short Name |
HTTP:CISCO:LINKSYS-APPLY-RCE |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Linksys E1500/E2500 apply.cgi Remote Command Injection |
Release Date |
2013/04/17 |
Update Number |
2255 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in the Cisco Linkys E1500/E2500 wi-fi routers. It is due to insufficient parameter validation. In a successful code injection attack, the behavior of the target host is entirely dependent on the intended function of the injected code and executes within the security context of the currently logged in user. If the attack is unsuccessful, the vulnerable application can terminate abnormally.