First published: Tue Oct 25 2022(Updated: )
Four format string injection vulnerabilities exist in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted HTTP request can lead to memory corruption, information disclosure and denial of service. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability arises from format string injection via the `default_key_id` and `key` HTTP parameters, as used within the `/action/wirelessConnect` handler.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Goabode Iota All-in-one Security Kit Firmware | =6.9x | |
Goabode Iota All-in-one Security Kit Firmware | =6.9z |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35886 is a format string injection vulnerability that exists in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X.
CVE-2022-35886 has a severity rating of 8.8, which is high.
CVE-2022-35886 can lead to memory corruption, information disclosure, and denial of service.
CVE-2022-35886 can be exploited by sending a specially-crafted HTTP request.
At the moment, there is no information available regarding fixes for CVE-2022-35886. It is recommended to follow the guidance provided by the vendor or security advisory.