First published: Tue Mar 15 2022(Updated: )
Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the firewall-local log function via the EmailAddress, SmtpServerName, SmtpUsername, and SmtpPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Arris Sbr-ac1900p Firmware | =1.0.7-b05 | |
Arris Sbr-ac1900p | ||
Arris Sbr-ac3200p Firmware | =1.0.7-b05 | |
Arris Sbr-ac3200p | ||
Arris Sbr-ac1200p Firmware | =1.0.5-b05 | |
Arris Sbr-ac1200p |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-26990 is critical with a score of 9.8.
Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05, and SBR-AC1200P 1.0.5-B05 are affected by CVE-2022-26990.
The vulnerability in Arris routers SBR-AC1900P, SBR-AC3200P, and SBR-AC1200P is a command injection vulnerability in the firewall-local log function.
The vulnerability in Arris routers SBR-AC1900P, SBR-AC3200P, and SBR-AC1200P allows attackers to execute arbitrary commands through the EmailAddress, SmtpServerName, SmtpUsername, and SmtpPassword parameters.
Currently, there is no known fix available for CVE-2022-26990. It is recommended to update to the latest firmware version once a fix is released.