First published: Tue Oct 25 2022(Updated: )
Four format string injection vulnerabilities exist in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted HTTP request can lead to memory corruption, information disclosure and denial of service. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability arises from format string injection via the `wpapsk_hex` HTTP parameter, as used within the `/action/wirelessConnect` handler.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Goabode Iota All-in-one Security Kit Firmware | =6.9x | |
Goabode Iota All-in-one Security Kit Firmware | =6.9z |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35885 refers to four format string injection vulnerabilities in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X.
You can find more information about CVE-2022-35885 in the Talos Intelligence vulnerability report at https://talosintelligence.com/vulnerability_reports/TALOS-2022-1585.
CVE-2022-35885 has a severity rating of 8.8 (High).
CVE-2022-35885 can lead to memory corruption, information disclosure, and denial of service in Abode Systems iota All-In-One Security Kit firmware version 6.9Z.
CVE-2022-35885 can lead to memory corruption, information disclosure, and denial of service in Abode Systems iota All-In-One Security Kit firmware version 6.9X.