Vulnerability Description
A buffer overflow vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A stack-based buffer overflow in the Start_EPI function within the httpd binary allows an authenticated attacker with administrator privileges to execute arbitrary commands on the underlying Linux operating system as root. This vulnerablity can be triggered over the network via a malicious POST request to /apply.cgi.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linksys | Wrt54Gl Firmware | <= 4.30.18.006 |
| Linksys | Wrt54Gl | - |
Related Weaknesses (CWE)
References
- https://youtu.be/73-1lhvJPNgExploitThird Party Advisory
- https://youtu.be/RfWVYCUBNZ0ExploitThird Party Advisory
- https://youtu.be/TeWAmZaKQ_wExploitThird Party Advisory
- https://youtu.be/73-1lhvJPNgExploitThird Party Advisory
- https://youtu.be/RfWVYCUBNZ0ExploitThird Party Advisory
- https://youtu.be/TeWAmZaKQ_wExploitThird Party Advisory
FAQ
What is CVE-2022-43970?
CVE-2022-43970 is a vulnerability with a CVSS score of 7.2 (HIGH). A buffer overflow vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A stack-based buffer overflow in the Start_EPI function within the httpd binary allo...
How severe is CVE-2022-43970?
CVE-2022-43970 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-43970?
Check the references section above for vendor advisories and patch information. Affected products include: Linksys Wrt54Gl Firmware, Linksys Wrt54Gl.