Command Injection Vulnerability in TOTOLINK N600R Router
CVE-2022-27411
9.8CRITICAL
Summary
A command injection vulnerability exists in the TOTOLINK N600R router, specifically within the 'Main' function. The issue occurs through improper handling of the QUERY_STRING parameter, allowing an attacker to execute arbitrary commands on the device. This potentially compromises the integrity and confidentiality of the network's configuration and data. It is crucial for users to apply updates or implement mitigation strategies to safeguard against potential exploitation.
References
EPSS Score
6% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved