First published: Tue Mar 15 2022(Updated: )
Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the static ip settings function via the wan_ip_stat, wan_mask_stat, wan_gw_stat, and wan_dns1_stat parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Commscope Arris Tr3300 Firmware | =1.0.13 | |
Commscope Arris Tr3300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26999 is a command injection vulnerability in Arris TR3300 v1.0.13 router firmware.
CVE-2022-26999 has a severity rating of 9.8, which is considered critical.
CVE-2022-26999 allows attackers to execute arbitrary commands on the affected Arris TR3300 v1.0.13 router firmware.
Only the Arris TR3300 v1.0.13 firmware is affected by CVE-2022-26999; the Commscope Arris Tr3300 hardware itself is not vulnerable.
To fix CVE-2022-26999, you should update the Arris TR3300 firmware to a version that patches the command injection vulnerability.