Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Iran-Linked Hacktivists Declare Harmful Cyberattack on Medtech Agency Stryker

    March 15, 2026

    Right this moment’s NYT Mini Crossword Solutions for March 15

    March 15, 2026

    Multilingual Reasoning Gymnasium: Multilingual Scaling of Procedural Reasoning Environments

    March 15, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»CISA Provides Actively Exploited Sierra Wi-fi Router Flaw Enabling RCE Assaults
    AI Ethics & Regulation

    CISA Provides Actively Exploited Sierra Wi-fi Router Flaw Enabling RCE Assaults

    Declan MurphyBy Declan MurphyDecember 14, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    CISA Provides Actively Exploited Sierra Wi-fi Router Flaw Enabling RCE Assaults
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Dec 13, 2025Ravie LakshmananCommunity Safety / Vulnerability

    The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Friday added a high-severity flaw impacting Sierra Wi-fi AirLink ALEOS routers to its Recognized Exploited Vulnerabilities (KEV) catalog, following experiences of lively exploitation within the wild.

    CVE-2018-4063 (CVSS rating: 8.8/9.9) refers to an unrestricted file add vulnerability that might be exploited to realize distant code execution by way of a malicious HTTP request.

    “A specifically crafted HTTP request can add a file, leading to executable code being uploaded, and routable, to the webserver,” the company mentioned. “An attacker could make an authenticated HTTP request to set off this vulnerability.”

    Cybersecurity

    Particulars of the six-year-old flaw had been publicly shared by Cisco Talos in April 2019, describing it as an exploitable distant code execution vulnerability within the ACEManager “add.cgi” perform of Sierra Wi-fi AirLink ES450 firmware model 4.9.3. Talos reported the flaw to the Canadian firm in December 2018.

    “This vulnerability exists within the file add functionality of templates inside the AirLink 450,” the corporate mentioned. “When importing template recordsdata, you may specify the title of the file that you’re importing.”

    “There are not any restrictions in place that shield the recordsdata which are at present on the gadget, used for regular operation. If a file is uploaded with the identical title of the file that already exists within the listing, then we inherit the permissions of that file.”

    Talos famous that a number of the recordsdata that exist within the listing (e.g., “fw_upload_init.cgi” or “fw_status.cgi”) have executable permissions on the gadget, that means an attacker can ship HTTP requests to the “/cgi-bin/add.cgi” endpoint to add a file with the identical title to realize code execution.

    That is compounded by the truth that ACEManager runs as root, thereby inflicting any shell script or executable uploaded to the gadget to additionally run with elevated privileges.

    The addition of CVE-2018-4063 to the KEV catalog comes a day after a honeypot evaluation carried out by Forescout over a 90-day interval revealed that industrial routers are probably the most attacked gadgets in operational expertise (OT) environments, with menace actors trying to ship botnet and cryptocurrency miner malware households like RondoDox, Redtail, and ShadowV2 by exploiting the next flaws –

    Cybersecurity

    Assaults have additionally been recorded from a beforehand undocumented menace cluster named Chaya_005 that weaponized CVE-2018-4063 in early January 2024 to add an unspecified malicious payload with the title “fw_upload_init.cgi.” No additional profitable exploitation efforts have been detected since then.

    “Chaya_005 seems to be a broader reconnaissance marketing campaign testing a number of vendor vulnerabilities somewhat than specializing in a single one,” Forescout Analysis – Vedere Labs mentioned, including it is probably the cluster is now not a “important menace.”

    In mild of lively exploitation of CVE-2018-4063, Federal Civilian Government Department (FCEB) companies are suggested to replace their gadgets to a supported model or discontinue using the product by January 2, 2026, because it has reached end-of-support standing.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Iran-Linked Hacktivists Declare Harmful Cyberattack on Medtech Agency Stryker

    March 15, 2026

    INC Ransom Menace Targets Australia And Pacific Networks

    March 15, 2026

    ShinyHunters Claims 1 Petabyte Information Breach at Telus Digital

    March 14, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Iran-Linked Hacktivists Declare Harmful Cyberattack on Medtech Agency Stryker

    By Declan MurphyMarch 15, 2026

    A hacktivist group with alleged hyperlinks to Iran’s intelligence companies has claimed accountability for a…

    Right this moment’s NYT Mini Crossword Solutions for March 15

    March 15, 2026

    Multilingual Reasoning Gymnasium: Multilingual Scaling of Procedural Reasoning Environments

    March 15, 2026

    Knowledge safety is the muse of belief in bodily AI

    March 15, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.