Software Command Injection Flaw (CVE-2021-35402) - Patch Now
CVE-2021-35402
PROLiNK PRC2402M 20190909 before 2021-06-13 allows live_api.cgi?page=satellite_list OS command injection via shell metacharacters in the ip parameter (for satellite_status)....
Overview
A critical security vulnerability has been identified in certain versions of the PROLiNK PRC2402M satellite router. This flaw allows a remote attacker to execute arbitrary operating system commands on the affected device, granting them full control.
Vulnerability Details
The vulnerability exists in the live_api.cgi component of the router’s web interface, specifically on the satellite_list page. The router fails to properly validate and sanitize user input in the ip parameter used for the satellite_status function. By injecting shell metacharacters (special characters used to chain commands) into this parameter, an attacker can trick the device into running malicious commands with the highest level of system privileges.
In simple terms, a field meant only for an IP address can be abused to run any command the attacker chooses.
Impact and Risk Assessment
This vulnerability is rated CRITICAL with a maximum CVSS score of 10.0. The potential impacts are severe:
- Complete System Compromise: An unauthenticated, remote attacker can gain full administrative control of the router.
- Network Breach: The compromised router can be used to launch further attacks on the internal network, intercept or modify traffic, and steal sensitive data.
- Persistence and Disruption: Attackers can install backdoors, change configurations, or render the router inoperable (denial of service).
Any PROLiNK PRC2402M device with firmware dated before 2021-06-13 is confirmed to be vulnerable.
Remediation and Mitigation
Immediate action is required to secure affected devices.
Primary Remediation: The vendor has released a firmware update to address this vulnerability. All users must:
- Upgrade the router firmware to a version dated 2021-06-13 or later.
- Obtain the firmware directly from the official PROLiNK support channels.
Important Mitigation Steps: If an immediate update is not possible, implement these network-level controls:
- Restrict Access: Ensure the router’s management interface is not exposed to the public internet. Use a firewall to block WAN-side access to the web administration ports (typically TCP 80 and 443).
- Network Segmentation: Place the router on a dedicated management VLAN, isolated from sensitive internal networks, to limit potential lateral movement in case of compromise.
After applying the firmware update, it is recommended to reboot the device and change all administrative passwords as a precautionary measure.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code ...
Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in authentication helper execution where helper configuration values are executed using shell=true without ...
PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_pro...
node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tesseract OCR. In all versions through 2.2.1, the recognize() function in src/index.js is vulnerable to OS Command Injection. T...