7.8
CVSSv3

CVE-2022-47040

Published: 26/01/2023 Updated: 06/02/2023
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8

Vulnerability Summary

An issue in ASKEY router RTF3505VW-N1 BR_SV_g000_R3505VMN1001_s32_7 allows malicious users to escalate privileges via running the tcpdump command after placing a crafted file in the /tmp directory and sending crafted packets through port 80.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

askey rtf3505vw-n1_firmware br_sv_g000_r3505vmn1001_s32_7

Github Repositories

CVE-2022-47040 An issue in ASKEY router RTF3505VW-N1 BR_SV_g000_R3505VMN1001_s32_7 allows attackers to escalate privileges via running the tcpdump command after placing a crafted file in the /tmp directory and sending crafted packets through port 80 authentication complexity vector not available not available not available confidentiality integrity availability

Privilege-escalation-ASKEY-Router-RTF3505VW-N1 CVE-2022-47040 Privilege escalation vulnerability on ASKEY routers Device: ASKEY RTF3505VW-N1 Firmware: BR_SV_g000_R3505VMN1001_s32_7 (not tested in other version) CLI Version: Reduced_CLI_HGU_v13 Exploit: ASKEY RTF3505VW-N1 devices are provided with access through ssh into a restricted default shell: The restricted shell has acce