The “puhttpsniff” service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2022-37 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: tenable
Published: 2022-12-16T00:00:00
Updated: 2022-12-16T00:00:00
Reserved: 2022-12-12T00:00:00
Link: CVE-2022-47208
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-12-16T20:15:08.860
Modified: 2023-08-08T14:21:49.707
Link: CVE-2022-47208
JSON object: View
Redhat Information
No data.
CWE