CVE-2022-28372
14.07.2022, 13:15
On Verizon 5G Home LVSKIHP InDoorUnit (IDU) 3.4.66.162 and OutDoorUnit (ODU) 3.33.101.0 devices, the CRTC and ODU RPC endpoints provide a means of provisioning a firmware update for the device via crtc_fw_upgrade or crtcfwimage. The URL provided is not validated, and thus allows for arbitrary file upload to the device. This occurs in /lib/lua/luci/crtc.lua (IDU) and /lib/functions/wnc_jsonsh/wnc_crtc_fw.sh (ODU).Enginsight
Vendor | Product | Version |
---|---|---|
verizon | lvskihp_indoorunit_firmware | 3.4.66.162 |
verizon | lvskihp_outdoorunit_firmware | 3.33.101.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References