Intrusion Prevention

FritzBox.Webcm.Unauthenticated.Command.Injection

Description

This indicates an attack attempt to exploit a Command Injection Vulnerability in FRITZ!Box devices.
The vulnerability is due to an input validation error while parsing a crafted HTTP request. A remote attacker could exploit this to execute arbitrary code within the context of target application, via a crafted HTTP request.

Affected Products

FRITZ!Box 7570 FRITZ!OS 4.92 and prior
FRITZ!Box 7490 FRITZ!OS 06.03 and prior
FRITZ!Box 7390 FRITZ!OS 06.03 and prior
FRITZ!Box 7360 FRITZ!OS 06.03 and prior
FRITZ!Box 7340 FRITZ!OS 06.03 and prior
FRITZ!Box 7330 FRITZ!OS 5.51 and prior
FRITZ!Box 7272 FRITZ!OS 5.56 and prior
FRITZ!Box 7270 FRITZ!OS 5.52 and prior
FRITZ!Box 7170 Annex A A/CH FRITZ!OS 4.77 and prior
FRITZ!Box 7170 Annex B English FRITZ!OS 4.83 and prior
FRITZ!Box 7170 Annex A English FRITZ!OS 4.85 and prior
FRITZ!Box 7140 FRITZ!OS 4.77 and prior
FRITZ!Box 7113 FRITZ!OS 4.86 and prior
FRITZ!Box 6840 LTE FRITZ!OS 5.51 and prior
FRITZ!Box 6810 LTE FRITZ!OS 5.51 and prior
FRITZ!Box 6360 Cable FRITZ!OS 06.03 / 04 and prior
FRITZ!Box 6320 Cable FRITZ!OS 06.03 and prior
FRITZ!Box 5124 FRITZ!OS 4.77 and prior
FRITZ!Box 5113 FRITZ!OS 4.83 and prior
FRITZ!Box 3390 FRITZ!OS 5.52 and prior
FRITZ!Box 3370 FRITZ!OS 5.52 and prior
FRITZ!Box 3272 FRITZ!OS 5.57 and prior
FRITZ!Box 3270 FRITZ!OS 5.52 and prior

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
http://www.avm.de/en/Sicherheit/update_list.html