mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-31 18:51:16 +00:00
64 lines
2.4 KiB
JSON
64 lines
2.4 KiB
JSON
{
|
|
"id": "CVE-2024-41992",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-11-11T01:15:04.813",
|
|
"lastModified": "2024-11-21T09:33:23.303",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Wi-Fi Alliance wfa_dut (in Wi-Fi Test Suite) through 9.0.0 allows OS command injection via 802.11x frames because the system() library function is used. For example, on Arcadyan FMIMG51AX000J devices, this leads to wfaTGSendPing remote code execution as root via traffic to TCP port 8000 or 8080 on a LAN interface. On other devices, this may be exploitable over a WAN interface."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La versi\u00f3n wfa_dut de Wi-Fi Alliance (en Wi-Fi Test Suite) hasta la versi\u00f3n 9.0.0 permite la inyecci\u00f3n de comandos del sistema operativo a trav\u00e9s de tramas 802.11x porque se utiliza la funci\u00f3n de librer\u00eda system(). Por ejemplo, en los dispositivos Arcadyan FMIMG51AX000J, esto lleva a la ejecuci\u00f3n remota del c\u00f3digo wfaTGSendPing como root a trav\u00e9s del tr\u00e1fico al puerto TCP 8000 o 8080 en una interfaz LAN. En otros dispositivos, esto puede ser explotable a trav\u00e9s de una interfaz WAN."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-78"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://ssd-disclosure.com/ssd-advisory-arcadyan-fmimg51ax000j-wifi-alliance-rce/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.kb.cert.org/vuls/id/123336",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |