First published: Thu Mar 23 2023(Updated: )
TOTOLink outdoor CPE CP900 V6.3c.566_B20171026 contains a command injection vulnerability in the NTPSyncWithHost function via the host_name parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink Cp900 Firmware | =6.3c.566_b20171026 | |
TOTOLINK CP900 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-28491 is critical with a CVSS score of 9.8.
The affected software version for CVE-2022-28491 is Totolink outdoor CPE CP900 V6.3c.566_B20171026.
CVE-2022-28491 is a command injection vulnerability in the NTPSyncWithHost function of Totolink outdoor CPE CP900 V6.3c.566_B20171026, where an attacker can execute arbitrary commands via a crafted request using the host_name parameter.
Yes, there are references available for CVE-2022-28491. You can find them here: [link1](https://github.com/B2eFly/CVE/blob/main/totolink/CP900/2/2.md) and [link2](https://github.com/B2eFly/Router/blob/main/totolink/CP900/1/2.md).
The Common Weakness Enumeration (CWE) ID for CVE-2022-28491 is CWE-77 and CWE-78.