Published: 23/05/2019 Updated: 24/08/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In OpenWrt LuCI up to and including 0.10, the endpoints admin/status/realtime/bandwidth_status and admin/status/realtime/wireless_status of the web application are affected by a command injection vulnerability.

Vulnerability Trend

Github Repositories

Exp of cve-2019-12272

EXP of CVE-2019-12272 CVE-2019-12272 is a vulnerablity of LuCI to execute arbitrary bash code Details hachp1githubio/posts/Web%E5%AE%89%E5%85%A8/20190710-lucircehtml Usage python \cve-2019-12272_bandwidth_statuspy -a 1921681534 -u root -p root -c ls python \cve-2019-12272_wireless_statuspy -a 1921681534 -u root -p root -c ls


lede-17013 Version-contains-cve-2019-12272

PoC auto collect from GitHub.

PoC in GitHub 2020 CVE-2020-0022 In reassemble_and_dispatch of packet_fragmentercc, there is possible out of bounds write due to an incorrect bounds calculation This could lead to remote code execution over Bluetooth with no additional execution privileges needed User interaction is not needed for exploitationProduct: AndroidVersions: Android-80 Android-81 Android-9 Andr