TOTOLink outdoor CPE CP900 V6.3c.566_B20171026 is discovered to contain a command injection vulnerability in the setUpgradeFW function via the filename parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
References
| Link | Resource |
|---|---|
| https://github.com/B2eFly/CVE/blob/main/totolink/CP900/5/5.md | Exploit Third Party Advisory |
| https://github.com/B2eFly/Router/blob/main/totolink/CP900/5/5.md | Broken Link |
| https://github.com/B2eFly/CVE/blob/main/totolink/CP900/5/5.md | Exploit Third Party Advisory |
| https://github.com/B2eFly/Router/blob/main/totolink/CP900/5/5.md | Broken Link |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 06:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/B2eFly/CVE/blob/main/totolink/CP900/5/5.md - Exploit, Third Party Advisory | |
| References | () https://github.com/B2eFly/Router/blob/main/totolink/CP900/5/5.md - Broken Link |
08 Aug 2023, 14:21
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-78 |
28 Mar 2023, 20:02
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://github.com/B2eFly/CVE/blob/main/totolink/CP900/5/5.md - Exploit, Third Party Advisory | |
| References | (MISC) https://github.com/B2eFly/Router/blob/main/totolink/CP900/5/5.md - Broken Link | |
| CPE | cpe:2.3:h:totolink:cp900:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:cp900_firmware:6.3c.566_b20171026:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | CWE-77 |
23 Mar 2023, 13:42
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-03-23 01:15
Updated : 2024-11-21 06:57
NVD link : CVE-2022-28494
Mitre link : CVE-2022-28494
CVE.ORG link : CVE-2022-28494
JSON object : View
Products Affected
totolink
- cp900_firmware
- cp900
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
