Versions of the package mt7688-wiscan before 0.8.3 are vulnerable to Command Injection due to improper input sanitization in the 'wiscan.scan' function.
References
Link | Resource |
---|---|
https://security.snyk.io/vuln/SNYK-JS-MT7688WISCAN-3177394 | Third Party Advisory |
https://github.com/simenkid/mt7688-wiscan/commit/ff6d6567c65b4e972916a8fbc4533212f20a2fa5 | Patch Third Party Advisory |
https://github.com/simenkid/mt7688-wiscan/blob/master/index.js%23L22 | Broken Link |
Configurations
Information
Published : 2023-01-31 21:15
Updated : 2023-02-08 07:35
NVD link : CVE-2022-25916
Mitre link : CVE-2022-25916
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
mt7688-wiscan_project
- mt7688-wiscan