cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-31740,https://securityvulnerability.io/vulnerability/CVE-2023-31740,Command Injection Vulnerability in Linksys E2000 Router,"The Linksys E2000 router, specifically firmware version 1.0.06, is susceptible to a command injection vulnerability within its web management interface. An attacker with access to web management can exploit this flaw by injecting malicious commands into specific post request parameters, including WL_atten_bb, WL_atten_radio, and WL_atten_ctl in the apply.cgi interface. Successful exploitation grants the attacker shell privileges, posing a significant risk to the device and the network it is connected to.",Linksys,E2000 Firmware,7.2,HIGH,0.01271000038832426,false,,false,false,false,,,false,false,,2023-05-23T01:15:00.000Z,0 CVE-2023-31741,https://securityvulnerability.io/vulnerability/CVE-2023-31741,Command Injection Vulnerability in Linksys E2000 Router Firmware,"A command injection vulnerability exists in the Linksys E2000 router firmware version 1.0.06. When an attacker gains unauthorized web management access, they can exploit this flaw by injecting malicious commands into the post request parameters including wl_ssid, wl_ant, wl_rate, WL_atten_ctl, ttcp_num, and ttcp_size via the httpd Start_EPI() function. This allows the attacker to execute commands with shell privileges, potentially compromising the router and the network it serves.",Linksys,E2000 Firmware,7.2,HIGH,0.01271000038832426,false,,false,false,false,,,false,false,,2023-05-23T01:15:00.000Z,0