First published: Thu Oct 20 2022(Updated: )
A stack-based buffer overflow vulnerability exists in the XCMD setIPCam functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A specially-crafted XCMD can lead to remote code execution. An attacker can send a malicious XML payload to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Goabode Iota All-in-one Security Kit Firmware | =6.9z | |
Goabode Iota All-in-one Security Kit | ||
Goabode Iota All-in-one Security Kit Firmware | =6.9x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-32454 is critical with a CVSS score of 9.8.
The affected software for CVE-2022-32454 is Goabode Iota All-in-one Security Kit Firmware versions 6.9x and 6.9z.
An attacker can exploit CVE-2022-32454 by sending a malicious XML payload to the setIPCam functionality of Abode Systems, Inc. iota All-In-One Security Kit version 6.9X and 6.9Z.
No, Goabode Iota All-in-one Security Kit is not vulnerable to CVE-2022-32454.
You can find more information about CVE-2022-32454 at the following link: [https://talosintelligence.com/vulnerability_reports/TALOS-2022-1560](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1560).