First published: Fri Mar 24 2023(Updated: )
TOTOLink outdoor CPE CP900 V6.3c.566_B20171026 is discovered to contain a command injection vulnerability in the setWebWlanIdx function via the webWlanIdx parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink Cp900 Firmware | =6.3c.566_b20171026 | |
TOTOLINK CP900 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28495 is a command injection vulnerability found in TOTOLink outdoor CPE CP900 V6.3c.566_B20171026.
CVE-2022-28495 has a severity rating of 9.8 (critical).
TOTOLink outdoor CPE CP900 V6.3c.566_B20171026 is affected by CVE-2022-28495.
An attacker can exploit CVE-2022-28495 by sending a crafted request containing arbitrary commands to the setWebWlanIdx function via the webWlanIdx parameter.
Yes, you can find references for CVE-2022-28495 at the following links: [link1](https://github.com/B2eFly/CVE/blob/main/totolink/CP900/3/3.md) and [link2](https://github.com/B2eFly/Router/blob/main/totolink/CP900/3/3.md).