Vulnerabilities (CVE)

Filtered by vendor Verizon Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-28375 1 Verizon 2 Lvskihp Outdoorunit, Lvskihp Outdoorunit Firmware 2023-08-08 N/A 9.8 CRITICAL
Verizon 5G Home LVSKIHP OutDoorUnit (ODU) 3.33.101.0 does not property sanitize user-controlled parameters within the crtcswitchsimprofile function of the crtcrpc JSON listener. A remote attacker on the local network can inject shell metacharacters into /usr/lib/lua/5.1/luci/controller/rpc.lua to achieve remote code execution as root,
CVE-2022-28369 1 Verizon 2 Lvskihp Indoorunit, Lvskihp Indoorunit Firmware 2022-07-21 N/A 9.8 CRITICAL
Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 does not validate the user-provided URL within the crtcmode function's enable_ssh sub-operation of the crtcrpc JSON listener (found at /lib/functions/wnc_jsonsh/crtcmode.sh) A remote attacker on the local network can provide a malicious URL. The data (found at that URL) is written to /usr/sbin/dropbear and then executed as root.
CVE-2022-28373 1 Verizon 2 Lvskihp Indoorunit, Lvskihp Indoorunit Firmware 2022-07-21 N/A 9.8 CRITICAL
Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 does not properly sanitize user-controlled parameters within the crtcreadpartition function of the crtcrpc JSON listener in /usr/lib/lua/luci/crtc.lua. A remote attacker on the local network can inject shell metacharacters to achieve remote code execution as root.