CVE-2021-35402
PROLiNK · PRC2402M Router
The PROLiNK PRC2402M router is vulnerable to OS command injection via shell metacharacters in the IP parameter of the live_api.cgi endpoint, enabling remote code execution.
Executive summary
An OS command injection vulnerability in PROLiNK PRC2402M routers allows unauthenticated attackers to execute arbitrary system commands with root privileges via the web interface.
Vulnerability
This is an OS command injection flaw located in the live_api.cgi component. By injecting shell metacharacters into the ip parameter during a satellite_status request, an unauthenticated attacker can force the device to execute arbitrary system-level commands.
Business impact
Successful exploitation allows for complete device compromise, potentially leading to network traffic interception, DNS hijacking, and persistent backdoors within the corporate or home network. The CVSS score of 10.0 reflects the maximum possible risk, indicating that the vulnerability is easily exploitable and carries devastating consequences for network security.
Remediation
Immediate Action: Apply the latest firmware update provided by PROLiNK to patch the command injection vulnerability in the live_api.cgi endpoint.
Proactive Monitoring: Monitor network traffic for suspicious outbound connections originating from the router and review web management logs for malformed CGI requests.
Compensating Controls: Disable remote management of the router from the WAN side and implement strict firewall rules to limit access to the internal web interface.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Given the critical nature of an OS command injection with a CVSS score of 10.0, immediate patching is the only viable solution. Administrators should verify that all PROLiNK PRC2402M devices are running firmware versions released after June 2021 to ensure the vulnerability is neutralized.