Show filters
54 Total Results
Displaying 21-30 of 54
Sort by:
Attacker Value
Unknown

CVE-2023-20790

Disclosure Date: August 07, 2023 (last updated October 08, 2023)
In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07740194; Issue ID: ALPS07740194.
Attacker Value
Unknown

CVE-2023-20775

Disclosure Date: July 04, 2023 (last updated October 08, 2023)
In display, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07978760; Issue ID: ALPS07363410.
Attacker Value
Unknown

CVE-2023-20725

Disclosure Date: June 06, 2023 (last updated October 08, 2023)
In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only); Issue ID: ALPS07734004 / ALPS07874358 (For MT6880, MT6890, MT6980, MT6990 only).
Attacker Value
Unknown

CVE-2023-20726

Disclosure Date: May 15, 2023 (last updated October 08, 2023)
In mnld, there is a possible leak of GPS location due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only); Issue ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only).
Attacker Value
Unknown

CVE-2023-20696

Disclosure Date: May 15, 2023 (last updated October 08, 2023)
In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07856356 / ALPS07874388 (For MT6880 and MT6890 only); Issue ID: ALPS07856356 / ALPS07874388 (For MT6880 and MT6890 only).
Attacker Value
Unknown

CVE-2023-20695

Disclosure Date: May 15, 2023 (last updated October 08, 2023)
In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only); Issue ID: ALPS07734012 / ALPS07874363 (For MT6880, MT6890, MT6980 and MT6990 only).
Attacker Value
Unknown

CVE-2023-20694

Disclosure Date: May 15, 2023 (last updated October 08, 2023)
In preloader, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07733998 / ALPS07874388 (For MT6880 and MT6890 only); Issue ID: ALPS07733998 / ALPS07874388 (For MT6880 and MT6890 only).
Attacker Value
Unknown

CVE-2023-24182

Disclosure Date: April 11, 2023 (last updated October 08, 2023)
LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the component /system/sshkeys.js.
Attacker Value
Unknown

CVE-2023-24181

Disclosure Date: April 10, 2023 (last updated October 08, 2023)
LuCI openwrt-22.03 branch git-22.361.69894-438c598 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /openvpn/pageswitch.htm.
Attacker Value
Unknown

CVE-2022-41435

Disclosure Date: November 03, 2022 (last updated December 22, 2024)
OpenWRT LuCI version git-22.140.66206-02913be was discovered to contain a stored cross-site scripting (XSS) vulnerability in the component /system/sshkeys.js. This vulnerability allows attackers to execute arbitrary web scripts or HTML via crafted public key comments.