漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 does not validate the user-provided URL within the crtcmode function's enable_ssh sub-operation of the crtcrpc JSON listener (found at /lib/functions/wnc_jsonsh/crtcmode.sh) A remote attacker on the local network can provide a malicious URL. The data (found at that URL) is written to /usr/sbin/dropbear and then executed as root.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Verizon 5G Home LVSKIHP 代码问题漏洞
Vulnerability Description
Verizon 5G Home LVSKIHP是美国Verizon公司的一款一体化集成调制解调器和路由器。可提供对 Verizon Wireless 5G 无线家庭互联网服务的访问。 Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162版本存在安全漏洞,该漏洞源于不会验证 crtcmode 函数 crtcrpc JSON监听器的enable_ssh子操作(可在 /lib/functions/wnc_jsonsh/crtcmode.sh)中用户提供的 URL
CVSS Information
N/A
Vulnerability Type
N/A