Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:linksys:wumc710_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99B71288-1A4B-4B47-8C4B-0FC7F7506BEC", "versionEndExcluding": "1.0.02", "vulnerable": true}, {"criteria": "cpe:2.3:o:linksys:wumc710_firmware:1.0.02:-:*:*:*:*:*:*", "matchCriteriaId": "9B38F142-6863-44F8-91A9-9321F8D93A8B", "vulnerable": true}, {"criteria": "cpe:2.3:o:linksys:wumc710_firmware:1.0.02:build3:*:*:*:*:*:*", "matchCriteriaId": "70D933E4-6AD8-4291-8006-29CE2F2D8184", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:linksys:wumc710:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E5B1752-FA07-483E-AA80-F6D95FAC29D5", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "An arbitrary code exection vulnerability exists in Linksys WUMC710 Wireless-AC Universal Media Connector with firmware <= 1.0.02 (build3). The do_setNTP function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious GET or POST request to /setNTP.cgi to execute arbitrary commands on the underlying Linux operating system as root."}, {"lang": "es", "value": "Existe una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo arbitrario en Linksys WUMC710 Wireless-AC Universal Media Connector con firmware <= 1.0.02 (build3). La funci\u00f3n do_setNTP dentro del binario httpd utiliza entradas de usuario no validadas en la construcci\u00f3n de un comando del sistema. Un atacante autenticado con privilegios de administrador puede aprovechar esta vulnerabilidad en la red mediante una solicitud GET o POST maliciosa a /setNTP.cgi para ejecutar comandos arbitrarios en el sistema operativo Linux subyacente como root."}], "id": "CVE-2022-43971", "lastModified": "2024-11-21T07:27:27.293", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "trellixpsirt@trellix.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2023-01-09T21:15:10.840", "references": [{"source": "trellixpsirt@trellix.com", "tags": ["Exploit", "Third Party Advisory"], "url": "https://youtu.be/73-1lhvJPNg"}, {"source": "trellixpsirt@trellix.com", "tags": ["Exploit", "Third Party Advisory"], "url": "https://youtu.be/RfWVYCUBNZ0"}, {"source": "trellixpsirt@trellix.com", "tags": ["Exploit", "Third Party Advisory"], "url": "https://youtu.be/TeWAmZaKQ_w"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://youtu.be/73-1lhvJPNg"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://youtu.be/RfWVYCUBNZ0"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://youtu.be/TeWAmZaKQ_w"}], "sourceIdentifier": "trellixpsirt@trellix.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-78"}], "source": "trellixpsirt@trellix.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-78"}], "source": "nvd@nist.gov", "type": "Primary"}]}