CVE-2021-35402

PROLiNK · PRC2402M Router

The PROLiNK PRC2402M router is vulnerable to OS command injection via shell metacharacters in the IP parameter of the live_api.cgi endpoint, enabling remote code execution.

Executive summary

An OS command injection vulnerability in PROLiNK PRC2402M routers allows unauthenticated attackers to execute arbitrary system commands with root privileges via the web interface.

Vulnerability

This is an OS command injection flaw located in the live_api.cgi component. By injecting shell metacharacters into the ip parameter during a satellite_status request, an unauthenticated attacker can force the device to execute arbitrary system-level commands.

Business impact

Successful exploitation allows for complete device compromise, potentially leading to network traffic interception, DNS hijacking, and persistent backdoors within the corporate or home network. The CVSS score of 10.0 reflects the maximum possible risk, indicating that the vulnerability is easily exploitable and carries devastating consequences for network security.

Remediation

Immediate Action: Apply the latest firmware update provided by PROLiNK to patch the command injection vulnerability in the live_api.cgi endpoint.

Proactive Monitoring: Monitor network traffic for suspicious outbound connections originating from the router and review web management logs for malformed CGI requests.

Compensating Controls: Disable remote management of the router from the WAN side and implement strict firewall rules to limit access to the internal web interface.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Given the critical nature of an OS command injection with a CVSS score of 10.0, immediate patching is the only viable solution. Administrators should verify that all PROLiNK PRC2402M devices are running firmware versions released after June 2021 to ensure the vulnerability is neutralized.