cvelist/2022/26xxx/CVE-2022-26582.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2022-03-10 17:24:47 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-12-16 22:00:38 +00:00
"ID": "CVE-2022-26582",
"STATE": "PUBLIC"
2022-03-10 17:24:47 +00:00
},
2022-12-16 22:00:38 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-03-10 17:24:47 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2023-04-12 14:00:34 +00:00
"value": "PAX A930 device with PayDroid_7.1.1_Virgo_V04.3.26T1_20210419 can allow an attacker to gain root access through command injection in systool client. The attacker must have shell access to the device in order to exploit this vulnerability."
2022-12-16 22:00:38 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://cyshield.com/e077d6c3-adff-49a1-afc3-71e10140f95c",
"url": "https://cyshield.com/e077d6c3-adff-49a1-afc3-71e10140f95c"
2023-03-01 00:00:34 +00:00
},
{
"refsource": "MISC",
"name": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2022/CVEs/CVE-2022-26582.md",
"url": "https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2022/CVEs/CVE-2022-26582.md"
2022-03-10 17:24:47 +00:00
}
]
}
}