Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0630 | Versions of the package mt7688-wiscan before 0.8.3 are vulnerable to Command Injection due to improper input sanitization in the 'wiscan.scan' function. |
Github GHSA |
GHSA-5h8c-8ccp-8gmh | mt7688-wiscan is vulnerable to Command Injection due to improper input sanitization |
Thu, 27 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-03-27T13:33:41.094Z
Reserved: 2022-02-24T11:58:26.970Z
Link: CVE-2022-25916
Updated: 2024-08-03T04:49:44.436Z
Status : Modified
Published: 2023-02-01T05:15:12.063
Modified: 2025-03-27T14:15:18.600
Link: CVE-2022-25916
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA