Логотип exploitDog
bind:CVE-2022-47208
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-47208

Количество 2

Количество 2

nvd логотип

CVE-2022-47208

около 3 лет назад

The “puhttpsniff” service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-4vhv-9xc2-4v6w

больше 2 лет назад

The “puhttpsniff” service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-47208

The “puhttpsniff” service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication.

CVSS3: 8.8
1%
Низкий
около 3 лет назад
github логотип
GHSA-4vhv-9xc2-4v6w

The “puhttpsniff” service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication.

CVSS3: 8.8
1%
Низкий
больше 2 лет назад

Уязвимостей на страницу