CVE-2022-43973

Severity
7.2HIGH
EPSS
1.0%
top 23.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 9

Description

An arbitrary code execution vulnerability exisits in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. The Check_TSSI function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious POST request to /apply.cgi to execute arbitrary commands on the underlying Linux operating system as root.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages2 packages

CVEListV5linksys/wrt54gl_wireless-g_broadband_routerFirmware4.30.18.006
NVDlinksys/wrt54gl_firmware4.30.18.006

🔴Vulnerability Details

2
GHSA
GHSA-j637-xgw5-6q5c: An arbitrary code execution vulnerability exisits in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 42023-01-09
CVEList
Arbitrary code execution in Linksys WRT54GL2023-01-09