Versions of the package mt7688-wiscan before 0.8.3 are vulnerable to Command Injection due to improper input sanitization in the 'wiscan.scan' function.
References
Link | Resource |
---|---|
https://github.com/simenkid/mt7688-wiscan/blob/master/index.js%23L22 | Broken Link |
https://github.com/simenkid/mt7688-wiscan/commit/ff6d6567c65b4e972916a8fbc4533212f20a2fa5 | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-MT7688WISCAN-3177394 | Third Party Advisory |
https://github.com/simenkid/mt7688-wiscan/blob/master/index.js%23L22 | Broken Link |
https://github.com/simenkid/mt7688-wiscan/commit/ff6d6567c65b4e972916a8fbc4533212f20a2fa5 | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-MT7688WISCAN-3177394 | Third Party Advisory |
Configurations
History
27 Mar 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-77 |
Information
Published : 2023-02-01 05:15
Updated : 2025-03-27 14:15
NVD link : CVE-2022-25916
Mitre link : CVE-2022-25916
CVE.ORG link : CVE-2022-25916
JSON object : View
Products Affected
mt7688-wiscan_project
- mt7688-wiscan
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
NVD-CWE-Other CWE-77Improper Neutralization of Special Elements used in a Command ('Command Injection')