OS Command Injection in iota All-In-One Security Kit by Abode Systems
CVE-2022-33205
10CRITICAL
Summary
The iota All-In-One Security Kit manufactured by Abode Systems is susceptible to multiple OS command injection vulnerabilities found in its web interface, specifically the /action/wirelessConnect functionality. By sending specially crafted HTTP requests, an authenticated attacker can execute arbitrary commands on the underlying operating system. This vulnerability arises from the unsafe handling of the ‘wpapsk_hex’ HTTP parameter, allowing for potential exploitation and undermining the security of affected firmware versions 6.9X and 6.9Z. Users are advised to apply recommended patches promptly to mitigate risks.
Affected Version(s)
iota All-In-One Security Kit 6.9X
iota All-In-One Security Kit 6.9Z
References
CVSS V3.1
Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved