Linksys Wrt54Gl Wireless-G Broadband Router vulnerabilities

3 known vulnerabilities affecting linksys/wrt54gl_wireless-g_broadband_router.

Total CVEs
3
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH3

Vulnerabilities

Page 1 of 1
CVE-2022-43970HIGHCVSS 7.2≥ Firmware, ≤ 4.30.18.0062023-01-09
CVE-2022-43970 [HIGH] CWE-120 CVE-2022-43970: A buffer overflow vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware A buffer overflow vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A stack-based buffer overflow in the Start_EPI function within the httpd binary allows an authenticated attacker with administrator privileges to execute arbitrary commands on the underlying Linux operating system as root. This vulnerabli
cvelistv5nvd
CVE-2022-43972HIGHCVSS 7.5≥ Firmware, ≤ 4.30.18.0062023-01-09
CVE-2022-43972 [MEDIUM] CWE-476 CVE-2022-43972: A null pointer dereference vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with A null pointer dereference vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A null pointer dereference in the soap_action function within the upnp binary can be triggered by an unauthenticated attacker via a malicious POST request invoking the AddPortMapping action.
cvelistv5nvd
CVE-2022-43973HIGHCVSS 7.2≥ Firmware, ≤ 4.30.18.0062023-01-09
CVE-2022-43973 [HIGH] CWE-78 CVE-2022-43973: An arbitrary code execution vulnerability exisits in Linksys WRT54GL Wireless-G Broadband Router wit An arbitrary code execution vulnerability exisits in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. The Check_TSSI function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a
cvelistv5nvd