First published: Mon Aug 22 2022(Updated: )
An os command injection vulnerability exists in the aVideoEncoder wget functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
WWBN AVideo | =11.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32572 is classified as a high severity vulnerability due to its potential for arbitrary command execution.
To fix CVE-2022-32572, you should upgrade to a patched version of WWBN AVideo that addresses this vulnerability.
CVE-2022-32572 affects WWBN AVideo version 11.6 and dev master commit 3f7c0364.
Yes, CVE-2022-32572 can allow remote attackers to execute arbitrary commands through specially-crafted HTTP requests.
More information about CVE-2022-32572 can typically be found through official vulnerability databases and security reports.