First published: Tue Oct 25 2022(Updated: )
Four OS command injection vulnerabilities exist in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A XCMD can lead to arbitrary command execution. An attacker can send a sequence of malicious commands to trigger these vulnerabilities.This vulnerability focuses on the unsafe use of the `WL_Key` and `WL_DefaultKeyID` configuration values in the function located at offset `0x1c7d28` of firmware 6.9Z , and even more specifically on the command execution occuring at offset `0x1c7f6c`.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Goabode Iota All-in-one Security Kit Firmware | =6.9x | |
Goabode Iota All-in-one Security Kit Firmware | =6.9z |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2022-33194.
CVE-2022-33194 has a severity level of critical.
The Goabode Iota All-in-one Security Kit Firmware versions 6.9x and 6.9z are affected by CVE-2022-33194.
CVE-2022-33194 allows for arbitrary command execution, which can be exploited by an attacker.
Yes, it is recommended to update to a patched version of the Goabode Iota All-in-one Security Kit Firmware to mitigate CVE-2022-33194.