{"uuid": "689f37db-0e05-4e02-bfb7-8537ef532a6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47521", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12310", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-47521\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_CHANNEL_LIST in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when parsing the operating channel attribute from Wi-Fi management frames.\n\ud83d\udccf Published: 2022-12-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-17T18:48:33.179Z\n\ud83d\udd17 References:\n1. https://lore.kernel.org/r/20221123153543.8568-4-philipturnbull%40github.com\n2. https://github.com/torvalds/linux/commit/f9b62f9843c7b0afdaecabbcebf1dbba18599408\n3. https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html\n4. https://security.netapp.com/advisory/ntap-20230113-0007/", "creation_timestamp": "2025-04-17T18:57:47.000000Z"}