CVE-2022-43970

A buffer overflow vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A stack-based buffer overflow in the Start_EPI function within the httpd binary allows an authenticated attacker with administrator privileges to execute arbitrary commands on the underlying Linux operating system as root. This vulnerablity can be triggered over the network via a malicious POST request to /apply.cgi.
References
Link Resource
https://youtu.be/73-1lhvJPNg Exploit Third Party Advisory
https://youtu.be/RfWVYCUBNZ0 Exploit Third Party Advisory
https://youtu.be/TeWAmZaKQ_w Exploit Third Party Advisory
https://youtu.be/73-1lhvJPNg Exploit Third Party Advisory
https://youtu.be/RfWVYCUBNZ0 Exploit Third Party Advisory
https://youtu.be/TeWAmZaKQ_w Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:linksys:wrt54gl_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:linksys:wrt54gl:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:27

Type Values Removed Values Added
New CVE

Information

Published : 2023-01-09 21:15

Updated : 2024-11-21 07:27


NVD link : CVE-2022-43970

Mitre link : CVE-2022-43970

CVE.ORG link : CVE-2022-43970


JSON object : View

Products Affected

linksys

  • wrt54gl_firmware
  • wrt54gl
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-787

Out-of-bounds Write