First published: Wed Nov 23 2022(Updated: )
TOTOLINK NR1800X V9.1.0u.6279_B20210910 contains a command injection via the hostName parameter in the setOpModeCfg function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink Lr350 Firmware | =9.3.5u.6369_b20220309 | |
TOTOLINK LR350 | ||
All of | ||
Totolink Lr350 Firmware | =9.3.5u.6369_b20220309 | |
TOTOLINK LR350 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44250 is a vulnerability in the TOTOLINK NR1800X router firmware that allows command injection through the hostName parameter in the setOpModeCfg function.
CVE-2022-44250 has a severity score of 9.8 (out of 10), indicating a critical vulnerability.
TOTOLINK NR1800X V9.1.0u.6279_B20210910 and Totolink Lr350 Firmware 9.3.5u.6369_b20220309 are affected by CVE-2022-44250.
To fix CVE-2022-44250, update your TOTOLINK NR1800X router firmware to a version that includes a security patch.
You can find more information about CVE-2022-44250 at the following link: [CVE-2022-44250](https://brief-nymphea-813.notion.site/LR350-command-injection-setOpModeCfg-7133dfcdeb9c4dfb87d9b5f4490b9a07).