First published: Thu May 12 2022(Updated: )
An OS command injection vulnerability exists in the httpd wlscan_ASP functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Inhandnetworks Inrouter302 Firmware | =3.5.37 | |
Inhand Networks Ir302 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26085 is classified as a critical vulnerability due to its ability to allow arbitrary command execution on the affected device.
To mitigate CVE-2022-26085, it is recommended to upgrade the firmware of InHand Networks InRouter302 to version 3.5.37 or higher.
CVE-2022-26085 specifically affects InHand Networks InRouter302 running firmware version 3.5.4.
Attackers can exploit CVE-2022-26085 by sending a specially-crafted HTTP request to the vulnerable httpd wlscan_ASP functionality.
Yes, an attacker must make an authenticated HTTP request to trigger the OS command injection vulnerability in CVE-2022-26085.