{"api_version":"1","generated_at":"2026-04-26T15:13:18+00:00","cve":"CVE-2022-43970","urls":{"html":"https://cve.report/CVE-2022-43970","api":"https://cve.report/api/cve/CVE-2022-43970.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-43970","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-43970"},"summary":{"title":"CVE-2022-43970","description":"A buffer overflow vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A stack-based buffer overflow in the Start_EPI function within the httpd binary allows an authenticated attacker with administrator privileges to execute arbitrary commands on the underlying Linux operating system as root. This vulnerablity can be triggered over the network via a malicious POST request to /apply.cgi.","state":"PUBLIC","assigner":"trellixpsirt@trellix.com","published_at":"2023-01-09 21:15:00","updated_at":"2023-01-13 14:19:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://youtu.be/RfWVYCUBNZ0","name":"https://youtu.be/RfWVYCUBNZ0","refsource":"CONFIRM","tags":[],"title":"Vuln Research 101 (Part 3) - Hacking the Linksys WRT54GL via buffer overflow - YouTube","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://youtu.be/TeWAmZaKQ_w","name":"https://youtu.be/TeWAmZaKQ_w","refsource":"CONFIRM","tags":[],"title":"Vuln Research 101 (Part 2) - Hacking the Linksys WRT54GL via command injection - YouTube","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://youtu.be/73-1lhvJPNg","name":"https://youtu.be/73-1lhvJPNg","refsource":"CONFIRM","tags":[],"title":"Please update your browser","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-43970","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-43970","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Jessie Chick of Trellix ARC","lang":""}],"nvd_cpes":[{"cve_year":"2022","cve_id":"43970","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"linksys","cpe5":"wrt54gl","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"43970","vulnerable":"1","versionEndIncluding":"4.30.18.006","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linksys","cpe5":"wrt54gl_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"trellixpsirt@trellix.com","ID":"CVE-2022-43970","STATE":"PUBLIC","TITLE":"Buffer overflow in Linksys WRT54GL"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"WRT54GL Wireless-G Broadband Router","version":{"version_data":[{"version_affected":"<=","version_name":"Firmware","version_value":"4.30.18.006"}]}}]},"vendor_name":"Linksys"}]}},"credit":[{"lang":"eng","value":"Jessie Chick of Trellix ARC"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A buffer overflow vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A stack-based buffer overflow in the Start_EPI function within the httpd binary allows an authenticated attacker with administrator privileges to execute arbitrary commands on the underlying Linux operating system as root. This vulnerablity can be triggered over the network via a malicious POST request to /apply.cgi."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"}]}]},"references":{"reference_data":[{"name":"https://youtu.be/73-1lhvJPNg","refsource":"CONFIRM","url":"https://youtu.be/73-1lhvJPNg"},{"name":"https://youtu.be/TeWAmZaKQ_w","refsource":"CONFIRM","url":"https://youtu.be/TeWAmZaKQ_w"},{"name":"https://youtu.be/RfWVYCUBNZ0","refsource":"CONFIRM","url":"https://youtu.be/RfWVYCUBNZ0"}]},"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2023-01-09 21:15:00","lastModifiedDate":"2023-01-13 14:19:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:linksys:wrt54gl_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"4.30.18.006","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:linksys:wrt54gl:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}