CVE-2022-43973

CVSS V2 None CVSS V3 None
Description
An arbitrary code execution vulnerability exisits in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. The Check_TSSI function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious POST request to /apply.cgi to execute arbitrary commands on the underlying Linux operating system as root.
Overview
  • CVE ID
  • CVE-2022-43973
  • Assigner
  • trellixpsirt@trellix.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-09T21:15:10
  • Last Modified Date
  • 2023-01-13T16:40:17
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:linksys:wrt54gl_firmware:*:*:*:*:*:*:*:* 1 OR 4.30.18.006
cpe:2.3:h:linksys:wrt54gl:-:*:*:*:*:*:*:* 0 OR
History
Created Old Value New Value Data Type Notes
2023-01-09 21:16:33 Added to TrackCVE
2023-01-09 21:16:34 Weakness Enumeration new
2023-01-10 14:18:40 2023-01-10T13:36:10 CVE Modified Date updated
2023-01-10 14:18:40 Received Awaiting Analysis Vulnerability Status updated
2023-01-12 15:15:52 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-13 18:19:27 2023-01-13T16:40:17 CVE Modified Date updated
2023-01-13 18:19:27 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-13 18:19:29 CPE Information updated