Filtered by vendor Openwrt
Subscriptions
Total
81 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-32815 | 4 Google, Linuxfoundation, Mediatek and 1 more | 40 Android, Yocto, Mt2713 and 37 more | 2024-11-21 | 4.4 Medium |
In gnss service, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08037801; Issue ID: ALPS08037801. | ||||
CVE-2023-32813 | 4 Google, Linuxfoundation, Mediatek and 1 more | 42 Android, Yocto, Mt2713 and 39 more | 2024-11-21 | 4.4 Medium |
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017370; Issue ID: ALPS08017370. | ||||
CVE-2023-32812 | 4 Google, Linuxfoundation, Mediatek and 1 more | 39 Android, Yocto, Mt2713 and 36 more | 2024-11-21 | 6.7 Medium |
In gnss service, there is a possible out of bounds write due to improper input validation. This could lead to local esclation of privileges with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08017365; Issue ID: ALPS08017365. | ||||
CVE-2023-32806 | 4 Google, Linuxfoundation, Mediatek and 1 more | 33 Android, Yocto, Iot Yocto and 30 more | 2024-11-21 | 6.7 Medium |
In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441589; Issue ID: ALPS07441589. | ||||
CVE-2023-20832 | 5 Google, Linuxfoundation, Mediatek and 2 more | 40 Android, Yocto, Mt2735 and 37 more | 2024-11-21 | 6.7 Medium |
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08013530. | ||||
CVE-2023-20831 | 5 Google, Linuxfoundation, Mediatek and 2 more | 39 Android, Yocto, Mt2735 and 36 more | 2024-11-21 | 6.7 Medium |
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014162. | ||||
CVE-2023-20830 | 5 Google, Linuxfoundation, Mediatek and 2 more | 42 Android, Yocto, Mt2713 and 39 more | 2024-11-21 | 6.7 Medium |
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014156. | ||||
CVE-2023-20829 | 5 Google, Linuxfoundation, Mediatek and 2 more | 39 Android, Yocto, Mt2735 and 36 more | 2024-11-21 | 6.7 Medium |
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014148. | ||||
CVE-2023-20828 | 5 Google, Linuxfoundation, Mediatek and 2 more | 39 Android, Yocto, Mt2735 and 36 more | 2024-11-21 | 6.7 Medium |
In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08014144; Issue ID: ALPS08014144. | ||||
CVE-2023-20821 | 5 Google, Linuxfoundation, Mediatek and 2 more | 53 Android, Yocto, Mt2713 and 50 more | 2024-11-21 | 6.7 Medium |
In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07937113; Issue ID: ALPS07937113. | ||||
CVE-2023-20820 | 2 Mediatek, Openwrt | 14 Mt6890, Mt7603, Mt7612 and 11 more | 2024-11-21 | 7.2 High |
In wlan service, there is a possible command injection due to improper input validation. This could lead to remote code execution with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00244189; Issue ID: WCNCR00244189. | ||||
CVE-2023-20796 | 5 Google, Linuxfoundation, Mediatek and 2 more | 28 Android, Yocto, Mt2735 and 25 more | 2024-11-21 | 4.4 Medium |
In power, there is a possible memory corruption due to an incorrect bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929790; Issue ID: ALPS07929790. | ||||
CVE-2023-20790 | 5 Google, Linuxfoundation, Mediatek and 2 more | 68 Android, Yocto, Mt2713 and 65 more | 2024-11-21 | 4.4 Medium |
In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07740194; Issue ID: ALPS07740194. | ||||
CVE-2022-41435 | 1 Openwrt | 1 Luci | 2024-11-21 | 5.4 Medium |
OpenWRT LuCI version git-22.140.66206-02913be was discovered to contain a stored cross-site scripting (XSS) vulnerability in the component /system/sshkeys.js. This vulnerability allows attackers to execute arbitrary web scripts or HTML via crafted public key comments. | ||||
CVE-2022-38333 | 1 Openwrt | 1 Openwrt | 2024-11-21 | 7.5 High |
Openwrt before v21.02.3 and Openwrt v22.03.0-rc6 were discovered to contain two skip loops in the function header_value(). This vulnerability allows attackers to access sensitive information via a crafted HTTP request. | ||||
CVE-2021-45906 | 1 Openwrt | 1 Openwrt | 2024-11-21 | 5.4 Medium |
OpenWrt 21.02.1 allows XSS via the NAT Rules Name screen. | ||||
CVE-2021-45905 | 1 Openwrt | 1 Openwrt | 2024-11-21 | 5.4 Medium |
OpenWrt 21.02.1 allows XSS via the Traffic Rules Name screen. | ||||
CVE-2021-45904 | 1 Openwrt | 1 Openwrt | 2024-11-21 | 5.4 Medium |
OpenWrt 21.02.1 allows XSS via the Port Forwards Add Name screen. | ||||
CVE-2021-33425 | 1 Openwrt | 1 Openwrt | 2024-11-21 | 5.4 Medium |
A stored cross-site scripting (XSS) vulnerability was discovered in the Web Interface for OpenWRT LuCI version 19.07 which allows attackers to inject arbitrary Javascript in the OpenWRT Hostname via the Hostname Change operation. | ||||
CVE-2021-32019 | 1 Openwrt | 1 Openwrt | 2024-11-21 | 6.1 Medium |
There is missing input validation of host names displayed in OpenWrt before 19.07.8. The Connection Status page of the luci web-interface allows XSS, which can be used to gain full control over the affected system via ICMP. |