First published: Thu May 05 2022(Updated: )
It is found that there is a command injection vulnerability in the setWiFiSignalCfg interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A7100ru Firmware | =7.4cu.2313_b20191024 | |
TOTOlink A7100RU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-28582.
The severity of the vulnerability is critical with a score of 9.8.
The affected software is TOTOlink A7100RU (v7.4cu.2313_b20191024) router firmware version 7.4cu.2313_b20191024.
The vulnerability occurs in the setWiFiSignalCfg interface, allowing an attacker to execute arbitrary commands through a carefully constructed payload.
To fix CVE-2022-28582, it is recommended to update the TOTOlink A7100RU router firmware to a patched version.