Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the pptp (wan_pptp.html) function via the pptp_fix_ip, pptp_fix_mask, pptp_fix_gw, and wan_dns1_stat parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_14/14.md | Exploit Third Party Advisory | 
| https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_14/14.md | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 06:54
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_14/14.md - Exploit, Third Party Advisory | 
08 Aug 2023, 14:21
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-77 | 
25 Mar 2022, 14:30
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-78 | |
| References | (MISC) https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_14/14.md - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:h:commscope:arris_tr3300:-:*:*:*:*:*:*:* cpe:2.3:o:commscope:arris_tr3300_firmware:1.0.13:*:*:*:*:*:*:*  | 
|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : 10.0
         v3 : 9.8  | 
15 Mar 2022, 22:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2022-03-15 22:15
Updated : 2024-11-21 06:54
NVD link : CVE-2022-26995
Mitre link : CVE-2022-26995
CVE.ORG link : CVE-2022-26995
JSON object : View
Products Affected
                commscope
- arris_tr3300
 - arris_tr3300_firmware
 
CWE
                
                    
                        
                        CWE-77
                        
            Improper Neutralization of Special Elements used in a Command ('Command Injection')
