First published: Mon Sep 04 2023(Updated: )
In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Open edX | =19.07.0 | |
Open edX | =21.02.0 | |
MediaTek MT6890 | ||
MediaTek MT7603 Firmware | ||
MediaTek MT7612 firmware | ||
MediaTek MT7613 | ||
MediaTek MT7615 Firmware | ||
MediaTek MT7622 Firmware | ||
MediaTek MT7626 | ||
MediaTek MT7629 Firmware | ||
mediatek mt7915 firmware | ||
MediaTek MT7916 Firmware | ||
MediaTek MT7981 Firmware | ||
MediaTek MT7986 | ||
MediaTek MT7990 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this wlan service vulnerability is CVE-2023-20820.
CVE-2023-20820 has a severity rating of 7.2 (high).
No, user interaction is not needed for exploitation of CVE-2023-20820.
OpenWrt versions 19.07.0 and 21.02.0 are affected by CVE-2023-20820.
To fix the vulnerability CVE-2023-20820, apply the provided patch ID: WCNCR00244189.