2023-05-23 14:00:36 +00:00

24 lines
867 B
JSON

{
"id": "CVE-2023-31742",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-22T17:15:09.477",
"lastModified": "2023-05-23T13:04:43.693",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "There is a command injection vulnerability in the Linksys WRT54GL router with firmware version 4.30.18.006. If an attacker gains web management privileges, they can inject commands into the post request parameters wl_ant, wl_rate, WL_atten_ctl, ttcp_num, ttcp_size in the httpd s Start_EPI() function, thereby gaining shell privileges."
}
],
"metrics": {},
"references": [
{
"url": "http://linksys.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/D2y6p/CVE/blob/main/Linksys/CVE-2023-31742/Linksys_WRT54GL_RCE.pdf",
"source": "cve@mitre.org"
}
]
}