Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-46939 | An arbitrary code exection vulnerability exists in Linksys WUMC710 Wireless-AC Universal Media Connector with firmware <= 1.0.02 (build3). The do_setNTP function within the httpd binary uses unvalidated user input in the construction of a system command. An authenticated attacker with administrator privileges can leverage this vulnerability over the network via a malicious GET or POST request to /setNTP.cgi to execute arbitrary commands on the underlying Linux operating system as root. |
Wed, 09 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: trellix
Published:
Updated: 2025-04-09T14:23:20.652Z
Reserved: 2022-10-28T00:00:00.000Z
Link: CVE-2022-43971
Updated: 2024-08-03T13:47:05.143Z
Status : Modified
Published: 2023-01-09T21:15:10.840
Modified: 2024-11-21T07:27:27.293
Link: CVE-2022-43971
No data.
OpenCVE Enrichment
No data.
EUVD