First published: Wed May 18 2022(Updated: )
TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a command injection vulnerability via the magicid parameter in the function uci_cloudupdate_config.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3100r Firmware | =4.1.2cu.5050_b20200504 | |
Totolink A3100r Firmware | =4.1.2cu.5247_b20211129 | |
TOTOLink A3100R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29639 refers to a command injection vulnerability found in TOTOLINK A3100R firmware versions 4.1.2cu.5050_B20200504 and 4.1.2cu.5247_B20211129.
CVE-2022-29639 has a severity rating of 8.1, which is classified as critical.
CVE-2022-29639 allows an attacker to inject malicious commands via the 'magicid' parameter in the uci_cloudupdate_config function of TOTOLINK A3100R firmware versions 4.1.2cu.5050_B20200504 and 4.1.2cu.5247_B20211129.
Yes, TOTOLINK A3100R firmware version 4.1.2cu.5050_B20200504 is vulnerable to the command injection vulnerability (CVE-2022-29639).
Currently, there is no official fix available for CVE-2022-29639. It is recommended to update to a patched version as soon as it is released by the vendor.