First published: Tue Mar 15 2022(Updated: )
Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the ddns function via the DdnsUserName, DdnsHostName, and DdnsPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Arris Sbr-ac1900p Firmware | =1.0.7-b05 | |
Arris Sbr-ac1900p | ||
Arris Sbr-ac3200p Firmware | =1.0.7-b05 | |
Arris Sbr-ac3200p | ||
Arris Sbr-ac1200p Firmware | =1.0.5-b05 | |
Arris Sbr-ac1200p |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26992 is a command injection vulnerability in Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05, and SBR-AC1200P 1.0.5-B05.
CVE-2022-26992 has a severity rating of 9.8 out of 10 (critical).
Arris routers SBR-AC1900P, SBR-AC3200P, and SBR-AC1200P are affected by CVE-2022-26992.
Attackers can exploit CVE-2022-26992 by injecting arbitrary commands via the DdnsUserName, DdnsHostName, and DdnsPassword parameters in the ddns function of the affected routers.
At the moment, there is no known fix for CVE-2022-26992. It is recommended to follow the vendor's security advisories and apply any updates or patches once they become available.