Command Injection Vulnerability in TOTOLINK NR1800X Router
CVE-2022-44250
9.8CRITICAL
Summary
The TOTOLINK NR1800X router is susceptible to a command injection vulnerability due to improper handling of the hostName parameter within the setOpModeCfg function. An attacker could exploit this flaw to execute arbitrary commands on the affected device, potentially leading to unauthorized access and control over the router's configuration. It is crucial for users to secure their devices and apply available patches to mitigate the risks associated with this vulnerability.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved