CVE-2022-43972

A null pointer dereference vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A null pointer dereference in the soap_action function within the upnp binary can be triggered by an unauthenticated attacker via a malicious POST request invoking the AddPortMapping action.
References
Link Resource
https://youtu.be/73-1lhvJPNg Exploit Third Party Advisory
https://youtu.be/RfWVYCUBNZ0 Exploit Third Party Advisory
https://youtu.be/TeWAmZaKQ_w Exploit Third Party Advisory
https://youtu.be/73-1lhvJPNg Exploit Third Party Advisory
https://youtu.be/RfWVYCUBNZ0 Exploit Third Party Advisory
https://youtu.be/TeWAmZaKQ_w Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:linksys:wrt54gl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54gl:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:27

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de desreferencia de puntero nulo en el router Linksys WRT54GL Wireless-G Broadband con firmware &lt;= 4.30.18.006. Un atacante no autenticado puede desencadenar una desreferencia de puntero nulo en la función SOAP_action dentro del binario upnp a través de una solicitud POST maliciosa que invoca la acción AddPortMapping.
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 6.5
References () https://youtu.be/73-1lhvJPNg - Exploit, Third Party Advisory () https://youtu.be/73-1lhvJPNg - Exploit, Third Party Advisory
References () https://youtu.be/RfWVYCUBNZ0 - Exploit, Third Party Advisory () https://youtu.be/RfWVYCUBNZ0 - Exploit, Third Party Advisory
References () https://youtu.be/TeWAmZaKQ_w - Exploit, Third Party Advisory () https://youtu.be/TeWAmZaKQ_w - Exploit, Third Party Advisory

Information

Published : 2023-01-09 21:15

Updated : 2024-11-21 07:27


NVD link : CVE-2022-43972

Mitre link : CVE-2022-43972

CVE.ORG link : CVE-2022-43972


JSON object : View

Products Affected

linksys

  • wrt54gl
  • wrt54gl_firmware
CWE
CWE-476

NULL Pointer Dereference