First published: Tue Mar 15 2022(Updated: )
Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the wps setting function via the wps_enrolee_pin parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Commscope Arris Tr3300 Firmware | =1.0.13 | |
Commscope Arris Tr3300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26998 is a command injection vulnerability discovered in Arris TR3300 v1.0.13, which allows attackers to execute arbitrary commands via a crafted request.
CVE-2022-26998 has a severity rating of 9.8, which is considered critical.
CVE-2022-26998 affects Arris TR3300 v1.0.13 by allowing attackers to execute arbitrary commands through the wps_enrolee_pin parameter in the wps setting function.
No, Commscope Arris Tr3300 is not vulnerable to CVE-2022-26998.
To fix CVE-2022-26998, it is recommended to update to a version of Arris TR3300 firmware that is not affected by the vulnerability.