First published: Mon Sep 04 2023(Updated: )
In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189.
Credit: security@mediatek.com security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenWrt OpenWrt | =19.07.0 | |
OpenWrt OpenWrt | =21.02.0 | |
Mediatek Mt6890 | ||
Mediatek Mt7603 | ||
Mediatek Mt7612 | ||
Mediatek Mt7613 | ||
Mediatek Mt7615 | ||
Mediatek Mt7622 | ||
Mediatek Mt7626 | ||
Mediatek Mt7629 | ||
Mediatek Mt7915 | ||
Mediatek Mt7916 | ||
Mediatek Mt7981 | ||
Mediatek Mt7986 | ||
Mediatek Mt7990 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this wlan service vulnerability is CVE-2023-20820.
CVE-2023-20820 has a severity rating of 7.2 (high).
No, user interaction is not needed for exploitation of CVE-2023-20820.
OpenWrt versions 19.07.0 and 21.02.0 are affected by CVE-2023-20820.
To fix the vulnerability CVE-2023-20820, apply the provided patch ID: WCNCR00244189.