An issue in BL-AC2100 <=V1.0.4 allows a remote attacker to execute arbitrary code via the time1 and time2 parameters in the set_LimitClient_cfg of the goahead webservice.
References
| Link | Resource |
|---|---|
| https://www.yuque.com/jichujiliangdanwei/vwbq9e/grfgkm2kvk6btwbp | Exploit Third Party Advisory |
| https://www.yuque.com/jichujiliangdanwei/vwbq9e/ux1426h170rhgfn7 | Exploit Third Party Advisory |
| https://www.yuque.com/jichujiliangdanwei/vwbq9e/grfgkm2kvk6btwbp | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-04-02 21:15
Updated : 2025-04-29 13:42
NVD link : CVE-2025-29062
Mitre link : CVE-2025-29062
CVE.ORG link : CVE-2025-29062
JSON object : View
Products Affected
lb-link
- bl-ac2100
- bl-ac2100_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
