A buffer overflow vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A stack-based buffer overflow in the Start_EPI function within the httpd binary allows an authenticated attacker with administrator privileges to execute arbitrary commands on the underlying Linux operating system as root. This vulnerablity can be triggered over the network via a malicious POST request to /apply.cgi.
References
Link | Resource |
---|---|
https://youtu.be/73-1lhvJPNg | Exploit Third Party Advisory |
https://youtu.be/RfWVYCUBNZ0 | Exploit Third Party Advisory |
https://youtu.be/TeWAmZaKQ_w | Exploit Third Party Advisory |
https://youtu.be/73-1lhvJPNg | Exploit Third Party Advisory |
https://youtu.be/RfWVYCUBNZ0 | Exploit Third Party Advisory |
https://youtu.be/TeWAmZaKQ_w | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://youtu.be/73-1lhvJPNg - Exploit, Third Party Advisory | |
References | () https://youtu.be/RfWVYCUBNZ0 - Exploit, Third Party Advisory | |
References | () https://youtu.be/TeWAmZaKQ_w - Exploit, Third Party Advisory | |
Summary |
|
Information
Published : 2023-01-09 21:15
Updated : 2024-11-21 07:27
NVD link : CVE-2022-43970
Mitre link : CVE-2022-43970
CVE.ORG link : CVE-2022-43970
JSON object : View
Products Affected
linksys
- wrt54gl
- wrt54gl_firmware