Описание
In Boa, there is a possible command injection due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: A20220026; Issue ID: OSBNB00144124.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до tlb7.3.258.100-p1-1555 (исключая)
Одновременно
cpe:2.3:a:mediatek:linkit_software_development_kit:*:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:en7528:-:*:*:*:*:*:*:*
Конфигурация 2Версия до tlb7.3.258.100-p1-1555 (исключая)
Одновременно
cpe:2.3:a:mediatek:linkit_software_development_kit:*:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:en7580:-:*:*:*:*:*:*:*
EPSS
Процентиль: 83%
0.01852
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-77
CWE-77
Связанные уязвимости
CVSS3: 9.8
github
около 3 лет назад
In Boa, there is a possible command injection due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: A20220026; Issue ID: OSBNB00144124.
EPSS
Процентиль: 83%
0.01852
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-77
CWE-77