First published: Tue Oct 25 2022(Updated: )
A double-free vulnerability exists in the web interface /action/ipcamSetParamPost functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A specially-crafted HTTP request can lead to memory corruption. An attacker can make an authenticated HTTP request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Goabode Iota All-in-one Security Kit Firmware | =6.9z | |
Goabode Iota All-in-one Security Kit | ||
Goabode Iota All-in-one Security Kit Firmware | =6.9x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32574 is a double-free vulnerability in the web interface /action/ipcamSetParamPost functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z.
The severity of CVE-2022-32574 is high with a CVSS score of 6.5.
CVE-2022-32574 affects Goabode Iota All-in-one Security Kit Firmware versions 6.9X and 6.9Z.
The CWE ID for CVE-2022-32574 is CWE-415.
No, Goabode Iota All-in-one Security Kit itself is not vulnerable to CVE-2022-32574.