First published: Tue Mar 15 2022(Updated: )
Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the pptp (wan_pptp.html) function via the pptp_fix_ip, pptp_fix_mask, pptp_fix_gw, and wan_dns1_stat parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Commscope Arris Tr3300 Firmware | =1.0.13 | |
Commscope Arris Tr3300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26995 is a command injection vulnerability in the Arris TR3300 v1.0.13 router.
The severity of CVE-2022-26995 is critical with a CVSS score of 9.8.
CVE-2022-26995 allows attackers to execute arbitrary commands via a crafted request in the pptp function.
Yes, Commscope Arris Tr3300 firmware version 1.0.13 is vulnerable to CVE-2022-26995.
There is no known fix for CVE-2022-26995 at the moment. It is recommended to contact the vendor for updates or mitigation measures.