Lucene search

K
cve[email protected]CVE-2022-43971
HistoryJan 09, 2023 - 9:15 p.m.

CVE-2022-43971

2023-01-0921:15:10
CWE-78
web.nvd.nist.gov
18
nvd
cve-2022-43971
linksys wumc710
wireless-ac
arbitrary code execution
firmware vulnerability
unvalidated input

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.9%

An arbitrary code exection vulnerability exists in Linksys WUMC710 Wireless-AC Universal Media Connector with firmware <= 1.0.02 (build3). The do_setNTP function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious GET or POST request to /setNTP.cgi to execute arbitrary commands on the underlying Linux operating system as root.

Affected configurations

NVD
Node
linksyswumc710_firmwareRange<1.0.02
OR
linksyswumc710_firmwareMatch1.0.02-
OR
linksyswumc710_firmwareMatch1.0.02build3
AND
linksyswumc710Match-

CNA Affected

[
  {
    "vendor": "Linksys",
    "product": "Linksys WUMC710 Wireless-AC Universal Media Connector",
    "versions": [
      {
        "version": "Firmware",
        "status": "affected",
        "lessThanOrEqual": "1.0.02 (build 3)",
        "versionType": "custom"
      }
    ]
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

58.9%

Related for CVE-2022-43971