Versio.io

CVE-2022-26209

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 15-03-2022 11:15
Last modified: - 22-03-2022 02:54
Total changes: - 3

Description

Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setUploadSetting, via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Low
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
9.8
Base score
3.9
5.9
Exploitability score
Impact score
 

Verification logic

OR
AND
OR
vendor=totolink AND product=a830r_firmware AND version=5.9c.4729_b20191112
OR
vendor=totolink AND product=a830r AND version=-
AND
OR
vendor=totolink AND product=a3100r_firmware AND version=4.1.2cu.5050_b20200504
OR
vendor=totolink AND product=a3100r AND version=-
AND
OR
vendor=totolink AND product=a950rg_firmware AND version=4.1.2cu.5161_b20200903
OR
vendor=totolink AND product=a950rg AND version=-
AND
OR
vendor=totolink AND product=a800r_firmware AND version=4.1.2cu.5137_b20200730
OR
vendor=totolink AND product=a800r AND version=-
AND
OR
vendor=totolink AND product=a3000ru_firmware AND version=5.9c.5185_b20201128
OR
vendor=totolink AND product=a3000ru AND version=-
AND
OR
vendor=totolink AND product=a810r_firmware AND version=4.1.2cu.5182_b20201026
OR
vendor=totolink AND product=a810r AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2022-26209

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.