First published: Tue Mar 15 2022(Updated: )
Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the pppoe function via the pppoe_username, pppoe_passwd, and pppoe_servicename parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Commscope Arris Tr3300 Firmware | =1.0.13 | |
Commscope Arris Tr3300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26996 is a command injection vulnerability in Arris TR3300 v1.0.13.
CVE-2022-26996 has a severity rating of 9.8 (Critical).
Arris TR3300 v1.0.13 is affected by CVE-2022-26996.
Attackers can exploit CVE-2022-26996 by executing arbitrary commands through crafted requests in the pppoe function using pppoe_username, pppoe_passwd, and pppoe_servicename parameters.
Yes, you can find more information about CVE-2022-26996 at the following reference: https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_13/13.md.