Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-35402 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: OS Command Injection in ProLink PRC2402M Router. πŸ“‰ **Consequences**: Attackers can execute arbitrary system commands, leading to total device compromise, data theft, or network disruption.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-78** (OS Command Injection). πŸ’₯ **Flaw**: The `ip` parameter is not properly sanitized, allowing malicious input to be interpreted as executable shell commands.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected Product**: ProLink PRC2402M Router (Singapore). πŸ“… **Vulnerable Versions**: All versions prior to **20190909** (specifically before the 2021-06-13 advisory date).

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: Full **Remote Command Execution**. πŸ“‚ **Impact**: Can read/modify sensitive data, install backdoors, pivot to internal networks, or take down the router completely.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Exploitation Threshold**: **LOW**. 🌐 **Auth**: None required (PR:N). πŸ–±οΈ **UI**: None required (UI:N). 🎯 **Access**: Network accessible (AV:N). Trivial to exploit remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exploit**: No specific PoC code provided in data. πŸ” **Reference**: See StarLabs SG Advisory (21-35402) for technical details. ⚠️ **Risk**: High likelihood of wild exploitation due to low barrier.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for ProLink PRC2402M devices. πŸ§ͺ **Test**: Inject payloads into the `ip` parameter via network requests. πŸ“Š **Indicator**: Look for command output in responses or side effects (e.g., DNS lookups).

Q8Is it fixed officially? (Patch/Mitigation)

πŸ”§ **Official Fix**: Yes. πŸ“₯ **Action**: Update firmware to version **20190909** or later. πŸ›‘οΈ **Mitigation**: Ensure the `ip` parameter is strictly validated/sanitized against shell metacharacters.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: Block external access to the router's management interface. 🚫 **Filter**: Use WAF or firewall rules to block shell injection patterns in the `ip` parameter.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **CRITICAL**. 🚨 **Urgency**: Immediate action required. CVSS Score is **High** (9.8+ implied by vector). Remote, unauthenticated, full control risk demands instant patching.