CVE-2022-43970
Summary
| CVE | CVE-2022-43970 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-01-09 21:15:00 UTC |
| Updated | 2023-01-13 14:19:00 UTC |
| Description | A buffer overflow vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A stack-based buffer overflow in the Start_EPI function within the httpd binary allows an authenticated attacker with administrator privileges to execute arbitrary commands on the underlying Linux operating system as root. This vulnerablity can be triggered over the network via a malicious POST request to /apply.cgi. |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Linksys | Wrt54gl | - | All | All | All |
| Operating System | Linksys | Wrt54gl Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Vuln Research 101 (Part 3) - Hacking the Linksys WRT54GL via buffer overflow - YouTube | CONFIRM | youtu.be | |
| Vuln Research 101 (Part 2) - Hacking the Linksys WRT54GL via command injection - YouTube | CONFIRM | youtu.be | |
| Please update your browser | CONFIRM | youtu.be | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Jessie Chick of Trellix ARC
There are currently no legacy QID mappings associated with this CVE.