CVE-2013-10058 – Linksys Router OS Command Injection Vulnerability

The following table lists the changes that have been made to the
CVE-2013-10058 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 01, 2025

    Action Type Old Value New Value
    Added Tag unsupported-when-assigned
    Added Description An authenticated OS command injection vulnerability exists in various Linksys router models (tested on WRT160Nv2) running firmware version v2.0.03 via the apply.cgi endpoint. The web interface fails to properly sanitize user-supplied input passed to the ping_size parameter during diagnostic operations. An attacker with valid credentials can inject arbitrary shell commands, enabling remote code execution.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-78
    Added Reference https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/linksys_wrt160nv2_apply_exec.rb
    Added Reference https://web.archive.org/web/20140830181242/http://www.s3cur1ty.de/m1adv2013-012
    Added Reference https://www.exploit-db.com/exploits/24478
    Added Reference https://www.exploit-db.com/exploits/25608
    Added Reference https://www.vulncheck.com/advisories/linksys-legacy-routers-remote-command-injection
Share the Post:

Related Posts