Arbitrary code execution in Linksys WUMC710
CVE-2022-43971
7.2HIGH
Key Information
- Vendor
- Linksys
- Status
- Linksys Wumc710 Wireless-ac Universal Media Connector
- Vendor
- CVE Published:
- 9 January 2023
Summary
An arbitrary code exection vulnerability exists in Linksys WUMC710 Wireless-AC Universal Media Connector with firmware <= 1.0.02 (build3). The do_setNTP function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious GET or POST request to /setNTP.cgi to execute arbitrary commands on the underlying Linux operating system as root.
Affected Version(s)
Linksys WUMC710 Wireless-AC Universal Media Connector <= 1.0.02 (build 3)
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Jessie Chick of Trellix ARC