9.8

CVE-2022-26207

Exploit

Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setDiagnosisCfg, via the ipDoamin parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
TotolinkA830r Firmware Version5.9c.4729_b20191112
   TotolinkA830r Version-
TotolinkA3100r Firmware Version4.1.2cu.5050_b20200504
   TotolinkA3100r Version-
TotolinkA950rg Firmware Version4.1.2cu.5161_b20200903
   TotolinkA950rg Version-
TotolinkA800r Firmware Version4.1.2cu.5137_b20200730
   TotolinkA800r Version-
TotolinkA3000ru Firmware Version5.9c.5185_b20201128
   TotolinkA3000ru Version-
TotolinkA810r Firmware Version4.1.2cu.5182_b20201026
   TotolinkA810r Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 17.34% 0.948
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.