Key Information Vulnerability Overview Vendor: Linksys Products: E6350, RE6300, RE6350, RE7000, RE9000 Versions: - RE63501: 0.04.001 - RE63001: 2.07.001 - RE63501: 0.04.001 - RE70001: 0.10.003 - RE90001: 0.04.002 Type: Remote Command Execution Author: Jian Peng Email: pengjian@ie.ac.cn Institution: Institute of Information Engineering, Chinese Academy of Sciences Vulnerability Description Impact Scope: Affects multiple products, including newer models such as RE6300, RE7000, etc. Reporting Environment: RE6500 Vulnerability Details: A command injection vulnerability was discovered in Linksys router firmware, allowing remote attackers to execute arbitrary OS commands via carefully crafted requests. Code Analysis Critical Function: Issue Point: The parameter is directly controlled by the attacker, enabling control over the variable and leading to OS exploitation. PoC (Proof of Concept) Test Command: Using , the router executes commands similar to the following: Result Successfully obtained a shell, confirming the existence and exploitability of the vulnerability. ``` These details summarize the key aspects of the vulnerability, including affected products and versions, vulnerability type, author information, description, code analysis, PoC, and results.