Lucene search

K
cveCybellumCVE-2022-38132
HistoryAug 24, 2022 - 12:15 a.m.

CVE-2022-38132

2022-08-2400:15:08
CWE-78
Cybellum
web.nvd.nist.gov
41
9
cve-2022-38132
linksys mr8300
router
command injection
vulnerability
ddns service
os commands

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0

Percentile

13.1%

Command injection vulnerability in Linksys MR8300 router while Registration to DDNS Service. By specifying username and password, an attacker connected to the router’s web interface can execute arbitrary OS commands. The username and password fields are not sanitized correctly and are used as URL construction arguments, allowing URL redirection to an arbitrary server, downloading an arbitrary script file, and eventually executing the file in the device. This issue affects: Linksys MR8300 Router 1.0.

Affected configurations

Nvd
Node
linksysmr8300_firmwareMatch1.0
AND
linksysmr8300Match-
VendorProductVersionCPE
linksysmr8300_firmware1.0cpe:2.3:o:linksys:mr8300_firmware:1.0:*:*:*:*:*:*:*
linksysmr8300-cpe:2.3:h:linksys:mr8300:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "MR8300 Router",
    "vendor": "Linksys",
    "versions": [
      {
        "status": "affected",
        "version": "Firmware 1.0"
      }
    ]
  }
]

Social References

More

CVSS3

8.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9

Confidence

High

EPSS

0

Percentile

13.1%

Related for CVE-2022-38132