First published: Tue Mar 15 2022(Updated: )
Arris TR3300 v1.0.13 were discovered to contain a command injection vulnerability in the dhcp function via the hostname parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Commscope Arris Tr3300 Firmware | =1.0.13 | |
Commscope Arris Tr3300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-27001 is critical with a CVSS score of 9.8.
The affected software for CVE-2022-27001 is Commscope Arris Tr3300 Firmware version 1.0.13.
CVE-2022-27001 allows attackers to execute arbitrary commands via a crafted request in the dhcp function of the Arris TR3300 router.
To fix CVE-2022-27001, it is recommended to update the firmware of the Arris TR3300 router to a version that has the vulnerability patched.
No, the Commscope Arris Tr3300 is not vulnerable to CVE-2022-27001.