Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The founders have just raised funding to revisit the same problem: affordable custom home design.

Marissa Mayer’s startup Dazzle raises $8 million led by Forerunner’s Kirsten Green

Amazon’s AI assistant Alexa+ now works with Angi, Expedia, Square, and Yelp

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA adds actively exploited flaw in Sierra wireless routers that enables RCE attacks
Identity

CISA adds actively exploited flaw in Sierra wireless routers that enables RCE attacks

userBy userDecember 13, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 13, 2025Ravi LakshmananNetwork security/vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw affecting Sierra Wireless AirLink ALEOS routers to its Known Exploited Vulnerabilities (KEV) catalog following reports of it being exploited in the wild.

CVE-2018-4063 (CVSS score: 8.8/9.9) refers to an unrestricted file upload vulnerability that can be exploited to cause remote code execution via a malicious HTTP request.

“A specially crafted HTTP request could result in a file being uploaded, which could result in executable code being uploaded and routed to a web server,” the agency said. “An attacker could craft an authenticated HTTP request to trigger this vulnerability.”

cyber security

Details of the six-year-old vulnerability were published by Cisco Talos in April 2019 and described as an exploitable remote code execution vulnerability in the ACEManager “upload.cgi” function of Sierra Wireless AirLink ES450 firmware version 4.9.3. Talos reported this flaw to the Canadian company in December 2018.

The company says, “This vulnerability exists in the template file upload function within AirLink 450.” When you upload a template file, you can specify the name of the file you are uploading.

“There are no restrictions protecting files that are currently on the device and used for normal operations. If a file is uploaded with the same name as a file that already exists in the directory, it will inherit the permissions of that file.”

Talos noted that some files present within the directory (such as “fw_upload_init.cgi” and “fw_status.cgi”) have executable permissions on the device. This means that an attacker can send an HTTP request to the “/cgi-bin/upload.cgi” endpoint to upload a file with the same name and execute code.

This is further exacerbated by the fact that ACEManager runs as root, which means that any shell scripts or executables uploaded to the device will also run with elevated privileges.

The addition of CVE-2018-4063 to the KEV catalog comes a day after Forescout’s 90-day honeypot analysis revealed that industrial routers are the most attacked devices in operational technology (OT) environments, with attackers exploiting the following flaws to distribute botnets and crypto miner malware families such as RondoDox, Redtail, and ShadowV2.

cyber security

We have also recorded an attack from a previously undocumented threat cluster named Chaya_005 that weaponized CVE-2018-4063 and uploaded an unspecified malicious payload named ‘fw_upload_init.cgi’ in early January 2024. No successful exploits have been detected since then.

Forescout Research – Vedere Labs said, “Chaya_005 appears to be a broader reconnaissance operation testing vulnerabilities from multiple vendors rather than focusing on a single vulnerability,” adding that the cluster is likely no longer a “significant threat.”

In view of the active exploitation of CVE-2018-4063, Federal Civilian Executive Branch (FCEB) agencies recommend that you update your devices to a supported version or discontinue use of the product by January 2, 2026, as it has reached End of Life status.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSkeleton discovered in Bulgaria revealed that a teenage boy managed to survive a brutal lion attack 6,200 years ago that left him severely injured
Next Article 2,000-year-old shipwreck may be Egypt’s ‘pleasure barge’ of the last dynasty of pharaohs
user
  • Website

Related Posts

Two Chrome extensions discovered to be secretly stealing credentials from over 170 sites

December 23, 2025

Interpol arrests 574 people in Africa. Ukrainian ransomware company pleads guilty

December 23, 2025

Google Workspace password manager tutorial

December 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The founders have just raised funding to revisit the same problem: affordable custom home design.

Marissa Mayer’s startup Dazzle raises $8 million led by Forerunner’s Kirsten Green

Amazon’s AI assistant Alexa+ now works with Angi, Expedia, Square, and Yelp

Lemon Slice gets $10.5 million from YC and Matrix to build digital avatar technology

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.