The “puhttpsniff” service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication.
History

Thu, 17 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2025-04-17T17:31:53.707Z

Reserved: 2022-12-12T00:00:00.000Z

Link: CVE-2022-47208

cve-icon Vulnrichment

Updated: 2024-08-03T14:47:29.421Z

cve-icon NVD

Status : Modified

Published: 2022-12-16T20:15:08.860

Modified: 2025-04-17T18:15:45.287

Link: CVE-2022-47208

cve-icon Redhat

No data.