First published: Wed Aug 03 2022(Updated: )
Improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in webapi component in Synology DiskStation Manager (DSM) before 7.0.1-42218-3 allows remote authenticated users to execute arbitrary commands via unspecified vectors.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
Synology DiskStation Manager | >=6.2<6.2.4-25556-5 | |
Synology DiskStation Manager | >=7.0<7.0.1-42218-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27616 refers to an OS Command Injection vulnerability in the webapi component of Synology DiskStation Manager (DSM) versions 6.2 and 7.0.1-42218-3.
The severity of CVE-2022-27616 is high with a CVSS score of 7.2.
The affected software is Synology DiskStation Manager (DSM) versions 6.2 and 7.0.1-42218-3.
CVE-2022-27616 allows remote authenticated users to execute arbitrary commands via unspecified vectors that exploit the OS Command Injection vulnerability in the webapi component of Synology DiskStation Manager (DSM).
Yes, a fix is available for CVE-2022-27616. Users should update their Synology DiskStation Manager (DSM) to version 7.0.1-42218-3 or apply the necessary security patch.