{"vulnerability": "CVE-2022-47521", "sightings": [{"uuid": "32cc7fbd-95c8-4246-bfb6-243d7ff39d8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47521", "type": "seen", "source": "https://t.me/crackcodes/1919", "content": "#exploit\n1. CVE-2022-47518, CVE-2022-47519, CVE-2022-47520, CVE-2022-47521:\nRemote DoS in Linux kernel WILC1000 wireless driver\nhttps://securitylab.github.com/advisories/GHSL-2022-112_GHSL-2022-115_wilc1000\n\n2. CVE-2022-2602:\nio_uring kernel exploit\nhttps://github.com/kiks7/CVE-2022-2602-Kernel-Exploit\n\n3. Directory Traversal Vulnerability in Huawei HG255s Products\nhttps://infosecwriteups.com/directory-ttraversal-vulnerability-in-huawei-hg255s-products-dce941a1d015", "creation_timestamp": "2023-01-07T23:30:10.000000Z"}, {"uuid": "689f37db-0e05-4e02-bfb7-8537ef532a6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47521", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12310", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-47521\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_CHANNEL_LIST in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when parsing the operating channel attribute from Wi-Fi management frames.\n\ud83d\udccf Published: 2022-12-18T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-17T18:48:33.179Z\n\ud83d\udd17 References:\n1. https://lore.kernel.org/r/20221123153543.8568-4-philipturnbull%40github.com\n2. https://github.com/torvalds/linux/commit/f9b62f9843c7b0afdaecabbcebf1dbba18599408\n3. https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html\n4. https://security.netapp.com/advisory/ntap-20230113-0007/", "creation_timestamp": "2025-04-17T18:57:47.000000Z"}, {"uuid": "7dadf88b-3641-4795-bdc7-0e246a86a335", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47521", "type": "seen", "source": "https://t.me/cyberbannews_ir/7120", "content": "\ud83c\udf10 \u06a9\u0634\u0641 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f \u062f\u0631 \u0647\u0633\u062a\u0647 \u0644\u06cc\u0646\u0648\u06a9\u0633\n\n\ud83d\udd39\u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0644\u06cc\u0646\u0648\u06a9\u0633 \u06a9\u0634\u0641 \u06a9\u0631\u062f\u0647\u200c\u0627\u0646\u062f \u06a9\u0647 \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u062a\u0648\u0633\u0637 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0645\u0648\u0631\u062f \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u06af\u0631\u0641\u062a\u0647 \u0628\u0627\u0634\u062f.\n\n\ud83d\udd39 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0627\u0631\u0627\u06cc \u0634\u0646\u0627\u0633\u0647 CVE-2022-47521 \u0627\u0633\u062a \u06a9\u0647 \u06cc\u06a9 \u0646\u0642\u0635 \u0627\u0645\u0646\u06cc\u062a\u06cc \u062f\u0631 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0645\u0627\u0642\u0628\u0644 \u06f6.\u06f0.\u06f1\u06f1 \u0647\u0633\u062a\u0647 \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0627\u0633\u062a \u0648 \u062f\u0644\u06cc\u0644 \u0622\u0646 \u0641\u0642\u062f\u0627\u0646 \u0627\u0639\u062a\u0628\u0627\u0631 IEEE80211_P2P_ATTR_CHANNEL_LIST \u062f\u0631 \u0641\u0627\u06cc\u0644 drivers/net/wireless/microchip/wilc1000/cfg80211.c \u062f\u0631 \u062f\u0631\u0627\u06cc\u0648\u0631 WILC1000 wireless \u0628\u0648\u062f\u0647 \u0648 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0646 \u0645\u0646\u062c\u0631 \u0628\u0647 \u062e\u0637\u0627\u06cc \u0633\u0631\u0631\u06cc\u0632 \u0628\u0627\u0641\u0631 \u0645\u0628\u062a\u0646\u06cc \u0628\u0631 heap \u0645\u06cc\u200c\u0634\u0648\u062f.\n\n\ud83d\udd39 \u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 \u062a\u0648\u0635\u06cc\u0647 \u06a9\u0631\u062f\u0647\u200c\u0627\u0646\u062f \u06a9\u0647 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0627\u0632 \u062c\u062f\u06cc\u062f\u062a\u0631\u06cc\u0646 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u0646\u062f \u062a\u0627 \u0628\u062a\u0648\u0627\u0646\u0646\u062f \u06a9\u0645\u062a\u0631\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0627 \u062f\u0631 \u0645\u0642\u0627\u0628\u0644 \u062d\u0645\u0644\u0627\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u062f\u0627\u0634\u062a\u0647 \u0628\u0627\u0634\u0646\u062f.\n\n#\u062d\u0645\u0644\u0647_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u0644\u06cc\u0646\u0648\u06a9\u0633 #\u0633\u0631\u0648\u0631 #\u0627\u0645\u0646\u06cc\u062a #\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc #\u0646\u0642\u0635_\u0627\u0645\u0646\u06cc\u062a\u06cc\n\n\ud83c\udd94 @cyberbannews_ir", "creation_timestamp": "2022-12-28T13:16:08.000000Z"}, {"uuid": "4dfa4984-6ee4-4a71-98a4-a62d548faa8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47521", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/7399", "content": "#exploit\n1. CVE-2022-47518, CVE-2022-47519, CVE-2022-47520, CVE-2022-47521:\nRemote DoS in Linux kernel WILC1000 wireless driver\nhttps://securitylab.github.com/advisories/GHSL-2022-112_GHSL-2022-115_wilc1000\n\n2. CVE-2022-2602:\nio_uring kernel exploit\nhttps://github.com/kiks7/CVE-2022-2602-Kernel-Exploit\n\n3. Directory Traversal in Huawei HG255s Products\nhttps://infosecwriteups.com/directory-ttraversal-vulnerability-in-huawei-hg255s-products-dce941a1d015", "creation_timestamp": "2022-12-22T06:30:04.000000Z"}]}