First published: Thu Oct 20 2022(Updated: )
Four OS command injection vulnerabilities exist in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A XCMD can lead to arbitrary command execution. An attacker can send a sequence of malicious commands to trigger these vulnerabilities.This vulnerability focuses on the unsafe use of the `WL_DefaultKeyID` in the function located at offset `0x1c7d28` of firmware 6.9Z, and even more specifically on the command execution occuring at offset `0x1c7fac`.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Goabode Iota All-in-one Security Kit Firmware | =6.9x | |
Goabode Iota All-in-one Security Kit Firmware | =6.9z |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-33195 is a vulnerability in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z that allows for arbitrary command execution.
CVE-2022-33195 has a severity rating of critical (severity value 10).
As a cybersecurity analyst, I am not able to provide guidance on exploiting vulnerabilities. It is recommended to follow responsible disclosure practices and report vulnerabilities to the affected vendor.
To fix CVE-2022-33195, users should update the firmware of the Abode Systems, Inc. iota All-In-One Security Kit to version 6.9X or 6.9Z, which addresses the OS command injection vulnerabilities.
You can find more information about CVE-2022-33195 in the vulnerability report published by Cisco Talos at the following link: https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559