CVE-2022-43973
CVSS V2 None
CVSS V3 None
Description
An arbitrary code execution vulnerability exisits in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. The Check_TSSI function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious POST request to /apply.cgi to execute arbitrary commands on the underlying Linux operating system as root.
Overview
- CVE ID
- CVE-2022-43973
- Assigner
- trellixpsirt@trellix.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-01-09T21:15:10
- Last Modified Date
- 2023-01-13T16:40:17
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:linksys:wrt54gl_firmware:*:*:*:*:*:*:*:* | 1 | OR | 4.30.18.006 | |
cpe:2.3:h:linksys:wrt54gl:-:*:*:*:*:*:*:* | 0 | OR |
References
Reference URL | Reference Tags |
---|---|
https://youtu.be/73-1lhvJPNg | |
https://youtu.be/RfWVYCUBNZ0 | |
https://youtu.be/TeWAmZaKQ_w |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-43973 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43973 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-09 21:16:33 | Added to TrackCVE | |||
2023-01-09 21:16:34 | Weakness Enumeration | new | ||
2023-01-10 14:18:40 | 2023-01-10T13:36:10 | CVE Modified Date | updated | |
2023-01-10 14:18:40 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-12 15:15:52 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-13 18:19:27 | 2023-01-13T16:40:17 | CVE Modified Date | updated | |
2023-01-13 18:19:27 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-13 18:19:29 | CPE Information | updated |