CVE-2019-15310

An issue was discovered on various devices via the Linkplay firmware. There is WAN remote code execution without user interaction. An attacker could retrieve the AWS key from the firmware and obtain full control over Linkplay's AWS estate, including S3 buckets containing device firmware. When combined with an OS command injection vulnerability within the XML Parsing logic of the firmware update process, an attacker would be able to gain code execution on any device that attempted to update. Note that by default all devices tested had automatic updates enabled.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linkplay:linkplay:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:28

Type Values Removed Values Added
References () https://labs.f-secure.com/advisories/linkplay-firmware-wanlan-remote-code-execution/ - Exploit, Third Party Advisory () https://labs.f-secure.com/advisories/linkplay-firmware-wanlan-remote-code-execution/ - Exploit, Third Party Advisory
References () https://labs.mwrinfosecurity.com/advisories/ - Third Party Advisory () https://labs.mwrinfosecurity.com/advisories/ - Third Party Advisory
References () https://linkplay.com/featured-products/ - Product () https://linkplay.com/featured-products/ - Product

Information

Published : 2020-07-01 20:15

Updated : 2024-11-21 04:28


NVD link : CVE-2019-15310

Mitre link : CVE-2019-15310

CVE.ORG link : CVE-2019-15310


JSON object : View

Products Affected

linkplay

  • linkplay
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-639

Authorization Bypass Through User-Controlled Key