Lucene search

K
cve[email protected]CVE-2022-28374
HistoryJul 14, 2022 - 1:15 p.m.

CVE-2022-28374

2022-07-1413:15:08
CWE-78
web.nvd.nist.gov
32
6
verizon
5g home
lvskihp
odu
dmacc urls
engineering portal
remote code execution
nvd
cve-2022-28374

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.6%

Verizon 5G Home LVSKIHP OutDoorUnit (ODU) 3.33.101.0 does not property sanitize user-controlled parameters within the DMACC URLs on the Settings page of the Engineering portal. An authenticated remote attacker on the local network can inject shell metacharacters into /usr/lib/lua/5.1/luci/controller/admin/settings.lua to achieve remote code execution as root.

Affected configurations

NVD
Node
verizonlvskihp_outdoorunit_firmwareMatch3.33.101.0
AND
verizonlvskihp_outdoorunitMatch-

Social References

More

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

75.6%

Related for CVE-2022-28374