Command Injection Vulnerability in Totolink Routers and Access Points
CVE-2022-26208

9.8CRITICAL

Key Information:

Vendor
Totolink
Vendor
CVE Published:
15 March 2022

Summary

Totolink routers and access points, including models A830R, A3100R, A950RG, A800R, A3000RU, and A810R, have been found to be susceptible to a command injection vulnerability. This issue arises in the 'setWebWlanIdx' function when the 'webWlanIdx' parameter is improperly validated, allowing attackers to execute arbitrary commands by sending specially crafted requests. The exploitation of this vulnerability can lead to unauthorized access and compromised network integrity, posing significant risks to both users and network administrators.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.