The “puhttpsniff” service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-49983 The “puhttpsniff” service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 17 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: tenable

Published:

Updated: 2025-04-17T17:31:53.707Z

Reserved: 2022-12-12T00:00:00.000Z

Link: CVE-2022-47208

cve-icon Vulnrichment

Updated: 2024-08-03T14:47:29.421Z

cve-icon NVD

Status : Modified

Published: 2022-12-16T20:15:08.860

Modified: 2025-04-17T18:15:45.287

Link: CVE-2022-47208

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.