漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
ON Semiconductor Quantenna router_command.sh (in the get_file_from_qtn argument) Argument Injection
Vulnerability Description
The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vulnerability Type
参数注入或修改
Vulnerability Title
Quantenna Communications Quantenna Wi-Fi chipset 安全漏洞
Vulnerability Description
Quantenna Communications Quantenna Wi-Fi chipset是美国Quantenna Communications公司的一个WiFi芯片。 Quantenna Communications Quantenna Wi-Fi chipset 8.0.0.28及之前版本存在安全漏洞,该漏洞源于router_command.sh脚本中get_file_from_qtn参数存在命令注入。
CVSS Information
N/A
Vulnerability Type
N/A