Command Injection Vulnerability in TOTOLink N600R Router from TOTOLink
CVE-2022-28910

9.8CRITICAL

Key Information:

Vendor
Totolink
Vendor
CVE Published:
10 May 2022

Summary

The TOTOLink N600R router has a command injection vulnerability that allows local attackers to execute arbitrary commands on the system through the devicename parameter in the /setting/setDeviceName API endpoint. This flaw can be exploited by sending specially crafted requests to the affected device, potentially leading to security breaches and unauthorized access to sensitive router configurations.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.