Arbitrary code execution in Linksys WRT54GL

CVE-2022-43973

7.2HIGH

Key Information

Vendor
Linksys
Status
Wrt54gl Wireless-g Broadband Router
Vendor
CVE Published:
9 January 2023

Summary

An arbitrary code execution vulnerability exisits in Linksys WRT54GL Wireless-G Broadband Router with firmware <= 4.30.18.006. The Check_TSSI function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious POST request to /apply.cgi to execute arbitrary commands on the underlying Linux operating system as root.

Affected Version(s)

WRT54GL Wireless-G Broadband Router <= 4.30.18.006

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

Jessie Chick of Trellix ARC
.