Vulnerability Description
Versions of the package mt7688-wiscan before 0.8.3 are vulnerable to Command Injection due to improper input sanitization in the 'wiscan.scan' function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mt7688-Wiscan Project | Mt7688-Wiscan | < 0.8.3 |
Related Weaknesses (CWE)
References
- https://github.com/simenkid/mt7688-wiscan/blob/master/index.js%23L22Broken Link
- https://github.com/simenkid/mt7688-wiscan/commit/ff6d6567c65b4e972916a8fbc453321PatchThird Party Advisory
- https://security.snyk.io/vuln/SNYK-JS-MT7688WISCAN-3177394Third Party Advisory
- https://github.com/simenkid/mt7688-wiscan/blob/master/index.js%23L22Broken Link
- https://github.com/simenkid/mt7688-wiscan/commit/ff6d6567c65b4e972916a8fbc453321PatchThird Party Advisory
- https://security.snyk.io/vuln/SNYK-JS-MT7688WISCAN-3177394Third Party Advisory
FAQ
What is CVE-2022-25916?
CVE-2022-25916 is a vulnerability with a CVSS score of 7.4 (HIGH). Versions of the package mt7688-wiscan before 0.8.3 are vulnerable to Command Injection due to improper input sanitization in the 'wiscan.scan' function.
How severe is CVE-2022-25916?
CVE-2022-25916 has been rated HIGH with a CVSS base score of 7.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-25916?
Check the references section above for vendor advisories and patch information. Affected products include: Mt7688-Wiscan Project Mt7688-Wiscan.