First published: Thu May 12 2022(Updated: )
An OS command injection vulnerability exists in the console infactory_wlan functionality of InHand Networks InRouter302 V3.5.37. A specially-crafted series of network requests can lead to remote code execution. An attacker can send a sequence of requests to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Inhandnetworks Inrouter302 Firmware | =3.5.37 | |
Inhand Networks Ir302 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26075 is rated as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2022-26075, upgrade the InHand Networks InRouter302 firmware to version 3.5.38 or later.
CVE-2022-26075 is an OS command injection vulnerability in the infactory_wlan functionality of InRouter302 firmware.
Users of InHand Networks InRouter302 with firmware version 3.5.37 are affected by CVE-2022-26075.
An attacker can exploit CVE-2022-26075 to execute arbitrary code on the affected device remotely.