Generated remediation guidance and an executive summary. No account required.
A shell injection issue in cosa_wifi_apis.c in the RDK RDKB-20181217-1 CcspWifiAgent module allows attackers with login credentials to execute arbitrary shell commands under the CcspWifiSsp process (running as root) if the platform was compiled with the ENABLE_FEATURE_MESHWIFI macro. The attack is conducted by changing the Wi-Fi network password to include crafted escape characters. This is related to the WebUI module.
Cite this page
CVE-2019-6962. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2019-6962
Use CWE-78, Rdkcentral vendor hub and Rdkb Ccsppandm product page to widen CVE-2019-6962 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2019-6964, CVE-2019-6963 and CVE-2019-6961 for nearby disclosures in the same product family.