First published: Mon Jan 09 2023(Updated: )
A buffer overflow vulnerability exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. A stack-based buffer overflow in the Start_EPI function within the httpd binary allows an authenticated attacker with administrator privileges to execute arbitrary commands on the underlying Linux operating system as root. This vulnerablity can be triggered over the network via a malicious POST request to /apply.cgi.
Credit: trellixpsirt@trellix.com trellixpsirt@trellix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linksys Wrt54gl Firmware | <=4.30.18.006 | |
Linksys WRT54GL | ||
All of | ||
Linksys Wrt54gl Firmware | <=4.30.18.006 | |
Linksys WRT54GL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43970 is a buffer overflow vulnerability that exists in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006.
CVE-2022-43970 has a severity rating of 7.2 (High).
CVE-2022-43970 allows an authenticated attacker with administrator privileges to execute arbitrary commands on the router.
CVE-2022-43970 affects Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006.
No, Linksys WRT54GL Wireless-G Broadband Router is not vulnerable to CVE-2022-43970.
To fix CVE-2022-43970, update the firmware of your Linksys WRT54GL Wireless-G Broadband Router to a version higher than 4.30.18.006.
CVE-2022-43970 is associated with the CWE categories 119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), 787 (Out-of-bounds Write), and 120 (Buffer Copy without Checking Size of Input).