Command Injection Vulnerability in Totolink Routers and Access Points
CVE-2022-26208
9.8CRITICAL
Summary
Totolink routers and access points, including models A830R, A3100R, A950RG, A800R, A3000RU, and A810R, have been found to be susceptible to a command injection vulnerability. This issue arises in the 'setWebWlanIdx' function when the 'webWlanIdx' parameter is improperly validated, allowing attackers to execute arbitrary commands by sending specially crafted requests. The exploitation of this vulnerability can lead to unauthorized access and compromised network integrity, posing significant risks to both users and network administrators.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved