Command Injection Vulnerability in TOTOLINK A7000R Router
CVE-2022-37079
7.8HIGH
Summary
The TOTOLINK A7000R router is susceptible to a command injection vulnerability, which can be exploited through the 'hostName' parameter within the 'setOpModeCfg' function. By manipulating this parameter, an unauthorized attacker can execute arbitrary commands on the underlying operating system of the device. This exposure can lead to significant security risks, including unauthorized access and control over network settings.
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved