First published: Thu Jul 07 2022(Updated: )
TOTOLINK EX300_V2 V4.0.3c.7484 was discovered to contain a command injection vulnerability via the langType parameter in the setLanguageCfg function. This vulnerability is exploitable via a crafted MQTT data packet.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink Ex300 V2 Firmware | =4.0.3c.7484 | |
Totolink Ex300 V2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32449 refers to a command injection vulnerability in TOTOLINK EX300_V2 V4.0.3c.7484 firmware.
CVE-2022-32449 has a severity rating of 9.8 (Critical).
The affected software version of CVE-2022-32449 is TOTOLINK EX300_V2 V4.0.3c.7484 firmware.
CVE-2022-32449 can be exploited through a crafted MQTT data packet.
Yes, you can find more information about CVE-2022-32449 at the following links: [link1](https://github.com/winmt/CVE/blob/main/TOTOLINK%20EX300_V2/README.md) and [link2](https://github.com/winmt/my-vuls/tree/main/TOTOLINK%20EX300_V2).