Command Injection Vulnerability in Totolink Routers
CVE-2022-26212
9.8CRITICAL
Summary
Multiple models of Totolink routers have been found to possess a command injection vulnerability within the setDeviceName function. Attackers can exploit this vulnerability by sending specially crafted requests that manipulate the deviceMac and deviceName parameters, enabling them to execute arbitrary commands on the affected devices. This security flaw can lead to unauthorized access and severe impacts on the network's integrity.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved