cve-2023-20820
Vulnerability from cvelistv5
Published
2023-09-04 02:27
Modified
2024-10-09 15:32
Severity ?
EPSS score ?
Summary
In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | MediaTek, Inc. | MT6890, MT7603, MT7612, MT7613, MT7615, MT7622, MT7626, MT7629, MT7915, MT7916, MT7981, MT7986, MT7990 |
Version: OpenWRT 19.07, 21.02 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:14:41.009Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://corp.mediatek.com/product-security-bulletin/September-2023" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt6890", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7603", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7612", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7613", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7615", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7622", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7626:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7626", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7629", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7915", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7916", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7981", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7986", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] }, { "cpes": [ "cpe:2.3:h:mediatek:mt7990:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mt7990", "vendor": "mediatek", "versions": [ { "status": "affected", "version": "openwrt_19.07" }, { "status": "affected", "version": "openwrt_2102" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-20820", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-09T15:10:16.025434Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-09T15:32:54.982Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "MT6890, MT7603, MT7612, MT7613, MT7615, MT7622, MT7626, MT7629, MT7915, MT7916, MT7981, MT7986, MT7990", "vendor": "MediaTek, Inc.", "versions": [ { "status": "affected", "version": "OpenWRT 19.07, 21.02" } ] } ], "descriptions": [ { "lang": "en", "value": "In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-04T02:27:15.884Z", "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "shortName": "MediaTek" }, "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/September-2023" } ] } }, "cveMetadata": { "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "assignerShortName": "MediaTek", "cveId": "CVE-2023-20820", "datePublished": "2023-09-04T02:27:15.884Z", "dateReserved": "2022-10-28T02:03:23.673Z", "dateUpdated": "2024-10-09T15:32:54.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA469E2-9E63-4C9A-8EBA-10C8C870063A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0133207-2EED-4625-854F-8DB7770D5BF7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"171D1C08-F055-44C0-913C-AA2B73AF5B72\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A45CDA9-95E6-4C02-8C3C-3B0CF7272A6F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF2E9975-607D-4F06-A85A-B1C2BE3C5B75\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4979BA07-DC09-4DF8-BA7F-E4143A0ECFE6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05748BB1-0D48-4097-932E-E8E2E574FD8D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55EB4B27-6264-45BE-9A22-BE8418BB0C06\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt7626:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79C6A4C1-BAB5-4C53-91CF-2637C2ECF37F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29C210A3-C71E-4010-9DD6-9E36CADC9EED\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AB22996-9C22-4B6C-9E94-E4C055D16335\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD5AA441-5381-4179-89EB-1642120F72B4\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"490CD97B-021F-4350-AEE7-A2FA866D5889\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40A9E917-4B34-403F-B512-09EEBEA46811\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:mediatek:mt7990:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4901B2A5-B0C8-4A0C-AC17-87D469744817\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189.\"}, {\"lang\": \"es\", \"value\": \"En wlan service, se presenta una posible inyecci\\u00f3n de comando debido a una comprobaci\\u00f3n de entrada inapropiada. Esto podr\\u00eda conducir a la divulgaci\\u00f3n de informaci\\u00f3n local con privilegios de ejecuci\\u00f3n del sistema necesarios. No es necesaria la interacci\\u00f3n del usuario para su explotaci\\u00f3n. ID del parche: WCNCR00244189; ID de la incidencia: WCNCR00244189.\"}]", "id": "CVE-2023-20820", "lastModified": "2024-11-21T07:41:36.537", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}]}", "published": "2023-09-04T03:15:07.840", "references": "[{\"url\": \"https://corp.mediatek.com/product-security-bulletin/September-2023\", \"source\": \"security@mediatek.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://corp.mediatek.com/product-security-bulletin/September-2023\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "security@mediatek.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2023-20820\",\"sourceIdentifier\":\"security@mediatek.com\",\"published\":\"2023-09-04T03:15:07.840\",\"lastModified\":\"2024-11-21T07:41:36.537\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189.\"},{\"lang\":\"es\",\"value\":\"En wlan service, se presenta una posible inyecci\u00f3n de comando debido a una comprobaci\u00f3n de entrada inapropiada. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n del sistema necesarios. No es necesaria la interacci\u00f3n del usuario para su explotaci\u00f3n. ID del parche: WCNCR00244189; ID de la incidencia: WCNCR00244189.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA469E2-9E63-4C9A-8EBA-10C8C870063A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0133207-2EED-4625-854F-8DB7770D5BF7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"171D1C08-F055-44C0-913C-AA2B73AF5B72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A45CDA9-95E6-4C02-8C3C-3B0CF7272A6F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF2E9975-607D-4F06-A85A-B1C2BE3C5B75\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4979BA07-DC09-4DF8-BA7F-E4143A0ECFE6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05748BB1-0D48-4097-932E-E8E2E574FD8D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55EB4B27-6264-45BE-9A22-BE8418BB0C06\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7626:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C6A4C1-BAB5-4C53-91CF-2637C2ECF37F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29C210A3-C71E-4010-9DD6-9E36CADC9EED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AB22996-9C22-4B6C-9E94-E4C055D16335\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD5AA441-5381-4179-89EB-1642120F72B4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"490CD97B-021F-4350-AEE7-A2FA866D5889\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40A9E917-4B34-403F-B512-09EEBEA46811\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7990:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4901B2A5-B0C8-4A0C-AC17-87D469744817\"}]}]}],\"references\":[{\"url\":\"https://corp.mediatek.com/product-security-bulletin/September-2023\",\"source\":\"security@mediatek.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://corp.mediatek.com/product-security-bulletin/September-2023\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://corp.mediatek.com/product-security-bulletin/September-2023\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T09:14:41.009Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-20820\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-09T15:10:16.025434Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*\"], \"vendor\": \"mediatek\", \"product\": \"mt6890\", \"versions\": [{\"status\": \"affected\", \"version\": \"openwrt_19.07\"}, {\"status\": \"affected\", \"version\": \"openwrt_2102\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:mediatek:mt7603:-:*:*:*:*:*:*:*\"], \"vendor\": \"mediatek\", \"product\": \"mt7603\", \"versions\": [{\"status\": \"affected\", \"version\": \"openwrt_19.07\"}, {\"status\": \"affected\", \"version\": \"openwrt_2102\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:mediatek:mt7612:-:*:*:*:*:*:*:*\"], \"vendor\": \"mediatek\", \"product\": \"mt7612\", \"versions\": [{\"status\": \"affected\", \"version\": \"openwrt_19.07\"}, {\"status\": \"affected\", \"version\": \"openwrt_2102\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:mediatek:mt7613:-:*:*:*:*:*:*:*\"], \"vendor\": \"mediatek\", \"product\": \"mt7613\", \"versions\": [{\"status\": \"affected\", \"version\": \"openwrt_19.07\"}, {\"status\": \"affected\", \"version\": \"openwrt_2102\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:mediatek:mt7615:-:*:*:*:*:*:*:*\"], \"vendor\": \"mediatek\", \"product\": \"mt7615\", \"versions\": [{\"status\": \"affected\", \"version\": \"openwrt_19.07\"}, {\"status\": \"affected\", \"version\": \"openwrt_2102\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:mediatek:mt7622:-:*:*:*:*:*:*:*\"], \"vendor\": \"mediatek\", \"product\": \"mt7622\", \"versions\": [{\"status\": \"affected\", \"version\": \"openwrt_19.07\"}, {\"status\": \"affected\", \"version\": \"openwrt_2102\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:mediatek:mt7626:-:*:*:*:*:*:*:*\"], \"vendor\": \"mediatek\", \"product\": \"mt7626\", \"versions\": [{\"status\": \"affected\", \"version\": \"openwrt_19.07\"}, {\"status\": \"affected\", \"version\": \"openwrt_2102\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:mediatek:mt7629:-:*:*:*:*:*:*:*\"], \"vendor\": \"mediatek\", \"product\": \"mt7629\", \"versions\": [{\"status\": \"affected\", \"version\": \"openwrt_19.07\"}, {\"status\": \"affected\", \"version\": \"openwrt_2102\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:mediatek:mt7915:-:*:*:*:*:*:*:*\"], \"vendor\": \"mediatek\", \"product\": \"mt7915\", \"versions\": [{\"status\": \"affected\", \"version\": \"openwrt_19.07\"}, {\"status\": \"affected\", \"version\": \"openwrt_2102\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:mediatek:mt7916:-:*:*:*:*:*:*:*\"], \"vendor\": \"mediatek\", \"product\": \"mt7916\", \"versions\": [{\"status\": \"affected\", \"version\": \"openwrt_19.07\"}, {\"status\": \"affected\", \"version\": \"openwrt_2102\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:mediatek:mt7981:-:*:*:*:*:*:*:*\"], \"vendor\": \"mediatek\", \"product\": \"mt7981\", \"versions\": [{\"status\": \"affected\", \"version\": \"openwrt_19.07\"}, {\"status\": \"affected\", \"version\": \"openwrt_2102\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:mediatek:mt7986:-:*:*:*:*:*:*:*\"], \"vendor\": \"mediatek\", \"product\": \"mt7986\", \"versions\": [{\"status\": \"affected\", \"version\": \"openwrt_19.07\"}, {\"status\": \"affected\", \"version\": \"openwrt_2102\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:h:mediatek:mt7990:-:*:*:*:*:*:*:*\"], \"vendor\": \"mediatek\", \"product\": \"mt7990\", \"versions\": [{\"status\": \"affected\", \"version\": \"openwrt_19.07\"}, {\"status\": \"affected\", \"version\": \"openwrt_2102\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-09T15:32:43.481Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"MediaTek, Inc.\", \"product\": \"MT6890, MT7603, MT7612, MT7613, MT7615, MT7622, MT7626, MT7629, MT7915, MT7916, MT7981, MT7986, MT7990\", \"versions\": [{\"status\": \"affected\", \"version\": \"OpenWRT 19.07, 21.02\"}]}], \"references\": [{\"url\": \"https://corp.mediatek.com/product-security-bulletin/September-2023\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Elevation of Privilege\"}]}], \"providerMetadata\": {\"orgId\": \"ee979b05-11f8-4f25-a7e0-a1fa9c190374\", \"shortName\": \"MediaTek\", \"dateUpdated\": \"2023-09-04T02:27:15.884Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2023-20820\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-09T15:32:54.982Z\", \"dateReserved\": \"2022-10-28T02:03:23.673Z\", \"assignerOrgId\": \"ee979b05-11f8-4f25-a7e0-a1fa9c190374\", \"datePublished\": \"2023-09-04T02:27:15.884Z\", \"assignerShortName\": \"MediaTek\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.