Command Injection Flaw in Totolink Routers A830R, A3100R, A950RG, A800R, A3000RU, A810R
CVE-2022-26214
9.8CRITICAL
Summary
The command injection vulnerability in specific Totolink router models allows attackers to exploit the NTPSyncWithHost function. By manipulating the host_time parameter, attackers can execute arbitrary commands, potentially compromising the security of the device and the network it is connected to. It is crucial for users of these devices to implement patches and security measures to mitigate this risk.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved