An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.
References
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
15 Dec 2025, 15:18
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Sierrawireless airlink Gx440
Sierrawireless aleos Sierrawireless airlink Mp70 Sierrawireless airlink Rv50x Sierrawireless airlink Lx60 Sierrawireless airlink Lx40 Sierrawireless airlink Ls300 Sierrawireless airlink Es440 Sierrawireless airlink Gx400 Sierrawireless airlink Gx450 Sierrawireless airlink Rv50 Sierrawireless airlink Mp70e |
|
| References | () http://packetstormsecurity.com/files/152648/Sierra-Wireless-AirLink-ES450-ACEManager-upload.cgi-Remote-Code-Execution.html - Exploit, VDB Entry | |
| References | () http://www.securityfocus.com/bid/108147 - Broken Link | |
| References | () https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03 - Third Party Advisory, US Government Resource | |
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-4063 - US Government Resource | |
| References | () https://www.forescout.com/blog/ot-network-security-threats-industrial-routers-under-attack/ - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:h:sierrawireless:airlink_es440:-:*:*:*:*:*:*:* cpe:2.3:h:sierrawireless:airlink_gx440:-:*:*:*:*:*:*:* cpe:2.3:h:sierrawireless:airlink_lx60:-:*:*:*:*:*:*:* cpe:2.3:h:sierrawireless:airlink_rv50:-:*:*:*:*:*:*:* cpe:2.3:h:sierrawireless:airlink_mp70:-:*:*:*:*:*:*:* cpe:2.3:h:sierrawireless:airlink_gx450:-:*:*:*:*:*:*:* cpe:2.3:o:sierrawireless:aleos:*:*:*:*:*:*:*:* cpe:2.3:h:sierrawireless:airlink_gx400:-:*:*:*:*:*:*:* cpe:2.3:h:sierrawireless:airlink_mp70e:-:*:*:*:*:*:*:* cpe:2.3:h:sierrawireless:airlink_rv50x:-:*:*:*:*:*:*:* cpe:2.3:h:sierrawireless:airlink_lx40:-:*:*:*:*:*:*:* cpe:2.3:h:sierrawireless:airlink_ls300:-:*:*:*:*:*:*:* |
12 Dec 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 04:06
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://packetstormsecurity.com/files/152648/Sierra-Wireless-AirLink-ES450-ACEManager-upload.cgi-Remote-Code-Execution.html - | |
| References | () http://www.securityfocus.com/bid/108147 - | |
| References | () https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03 - | |
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2018-0748 - Exploit, Third Party Advisory |
Information
Published : 2019-05-06 19:29
Updated : 2025-12-15 15:18
NVD link : CVE-2018-4063
Mitre link : CVE-2018-4063
CVE.ORG link : CVE-2018-4063
JSON object : View
Products Affected
sierrawireless
- airlink_mp70e
- airlink_rv50
- airlink_gx450
- airlink_gx400
- airlink_lx40
- airlink_rv50x
- airlink_es440
- airlink_es450
- airlink_lx60
- aleos
- airlink_gx440
- airlink_ls300
- airlink_mp70
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
