First published: Tue Oct 25 2022(Updated: )
Four format string injection vulnerabilities exist in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. Specially-crafted configuration values can lead to memory corruption, information disclosure and denial of service. An attacker can modify a configuration value and then execute an XCMD to trigger these vulnerabilities.This vulnerability arises from format string injection via the `default_key_id` configuration parameter, as used within the `testWifiAP` XCMD handler
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Goabode Iota All-in-one Security Kit Firmware | =6.9x | |
Goabode Iota All-in-one Security Kit Firmware | =6.9z |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-35877.
The severity rating of CVE-2022-35877 is critical with a value of 9.8.
CVE-2022-35877 refers to four format string injection vulnerabilities in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. These vulnerabilities can result in memory corruption, information disclosure, and denial of service.
CVE-2022-35877 affects Goabode Iota All-in-one Security Kit Firmware versions 6.9X and 6.9Z.
Yes, you can find additional reference material at the following link: [https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581](https://talosintelligence.com/vulnerability_reports/TALOS-2022-1581).