First published: Thu Mar 31 2022(Updated: )
Netcommunity OG410X and OG810X series (Netcommunity OG410Xa, OG410Xi, OG810Xa, and OG810Xi firmware Ver.2.28 and earlier) allow an attacker on the adjacent network to execute an arbitrary OS command via a specially crafted config file.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Ntt-east Og410xa Firmware | <=2.28 | |
Ntt-east Og410xa | ||
Ntt-east Og410xi Firmware | <=2.28 | |
Ntt-east Og410xi | ||
Ntt-east Og810xa Firmware | <=2.28 | |
Ntt-east Og810xa | ||
Ntt-east Og810xi Firmware | <=2.28 | |
Ntt-east Og810xi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-22986.
The severity of CVE-2022-22986 is high with a CVSS score of 8.8.
Netcommunity OG410Xa, OG410Xi, OG810Xa, and OG810Xi firmware versions up to 2.28 are affected.
An attacker on the adjacent network can execute an arbitrary OS command via a specially crafted config file.
It is recommended to update the Netcommunity OG410X and OG810X series firmware to version 2.29 or later to mitigate the vulnerability.