Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-24999 | In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189. |
Wed, 09 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: MediaTek
Published:
Updated: 2024-10-09T15:32:54.982Z
Reserved: 2022-10-28T02:03:23.673Z
Link: CVE-2023-20820
Updated: 2024-08-02T09:14:41.009Z
Status : Modified
Published: 2023-09-04T03:15:07.840
Modified: 2024-11-21T07:41:36.537
Link: CVE-2023-20820
No data.
OpenCVE Enrichment
No data.
EUVD