TITLE: Edimax BR-6104K UPnP Shell Command Injection Vulnerability SECUNIA ADVISORY ID: SA20169 VERIFY ADVISORY: http://secunia.com/advisories/20169/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From local network OPERATING SYSTEM: EDIMAX BR-6104K Broadband Router http://secunia.com/product/10080/ DESCRIPTION: Armijn Hemel has reported a vulnerability in Edimax BR-6104K, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable device. The vulnerability is caused due to missing authentication of UPnP AddPortMapping requests and missing validation of the NewInternalClient parameter of the request. This can be exploited by hosts on the local network to execute shell commands e.g. "/sbin/reboot" on the device via specially crafted UPnP AddPortMapping requests containing shell commands in the NewInternalClient parameter. SOLUTION: Disable the UPnP functionality if it is not required. UPnP is reportedly disabled by default. PROVIDED AND/OR DISCOVERED BY: Armijn Hemel ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------