Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-36553

EPSS 93.61% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-36553

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Hytec Inter HWL-2511-SS v1.05 and below was discovered to contain a command injection vulnerability via the component /www/cgi-bin/popen.cgi.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Hytec Inter HWL-2511-SS 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Hytec Inter HWL-2511-SS是日本Hytec Inter公司的一种工业 LTE 路由器和 Wi-Fi 接入点。 Hytec Inter HWL-2511-SS v1.05及之前存在安全漏洞,该漏洞源于组件/www/cgi-bin/popen.cgi 包含一个命令注入。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2022-36553

#POC DescriptionSource LinkShenlong Link
1PoC Script for CVE-2022-36553: Exploits an unauthenticated remote command injection vulnerability in Hytec Inter HWL-2511-SS device.https://github.com/0xNslabs/CVE-2022-36553-PoCPOC Details
2Hytec Inter HWL-2511-SS v1.05 and below was discovered to contain a command injection vulnerability via the component /www/cgi-bin/popen.cgi. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-36553.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-36553

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-08-29 · 74 CVEs total

CVE-2022-3254810.0 CRITICALDrayTek Vigor routers 安全漏洞
CVE-2022-211659.8 CRITICALArbitrary Command Injection
CVE-2022-256449.8 CRITICALArbitrary Code Execution
CVE-2022-259218.1 HIGHArbitrary Code Execution
CVE-2022-376807.5 HIGHHitachi Kokusai Electric ISnex HC-IP9100HD 访问控制错误漏洞
CVE-2022-376817.5 HIGHHitachi Kokusai Electric ISnex HC-IP9100HD 路径遍历漏洞
CVE-2022-0718Python-Oslo-Utils 日志信息泄露漏洞
CVE-2022-1115ImageMagick 缓冲区错误漏洞
CVE-2022-0850Linux kernel 安全漏洞
CVE-2022-0367libmodbus 缓冲区错误漏洞
CVE-2022-0812Linux kernel 信息泄露漏洞
CVE-2022-0497Openscad 缓冲区错误漏洞
CVE-2022-0496Openscad 缓冲区错误漏洞
CVE-2022-0485libnbd 代码问题漏洞
CVE-2022-0480Linux kernel 安全漏洞
CVE-2022-0669DPDK 资源管理错误漏洞
CVE-2022-0851Convert2RHEL 信息泄露漏洞
CVE-2022-0852Red Hat Convert2RHEL 安全漏洞
CVE-2022-1016Linux kernel 缓冲区错误漏洞
CVE-2022-1117glibc 安全特征问题漏洞

Showing top 20 of 74 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2022-36553

No comments yet


Leave a comment