8.8
CVE-2022-35887
- EPSS 1.65%
- Veröffentlicht 25.10.2022 17:15:55
- Zuletzt bearbeitet 21.11.2024 07:11:53
- Quelle talos-cna@cisco.com
- CVE-Watchlists
- Unerledigt
Four format string injection vulnerabilities exist in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted HTTP request can lead to memory corruption, information disclosure and denial of service. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability arises from format string injection via the `default_key_id` HTTP parameter, as used within the `/action/wirelessConnect` handler.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Goabode ≫ Iota All-in-one Security Kit Firmware Version6.9x
Goabode ≫ Iota All-in-one Security Kit Firmware Version6.9z
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 1.65% | 0.814 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| talos-cna@cisco.com | 8.2 | 3.9 | 4.2 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
|
CWE-134 Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.