Vulnerability & Exploit Database

Back to search

Linksys E1500/E2500 Remote Command Execution

Some Linksys Routers are vulnerable to an authenticated OS command injection. Default credentials for the web interface are admin/admin or admin/password. Since it is a blind os command injection vulnerability, there is no output for the executed command. A ping command against a controlled system for can be used for testing purposes.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

auxiliary/admin/http/linksys_e1500_e2500_exec

Authors

  • Michael Messner <devnull [at] s3cur1ty.de>

References

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/admin/http/linksys_e1500_e2500_exec msf auxiliary(linksys_e1500_e2500_exec) > show actions ...actions... msf auxiliary(linksys_e1500_e2500_exec) > set ACTION <action-name> msf auxiliary(linksys_e1500_e2500_exec) > show options ...show and set options... msf auxiliary(linksys_e1500_e2500_exec) > run

Related Modules