First published: Thu Jan 11 2024(Updated: )
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the hostName parameter in the setWanCfg function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink A3300r Firmware | =17.0.0cu.557_b20221024 | |
TOTOLINK A3300R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22942 has been rated as a high-severity vulnerability due to its potential for command execution.
To fix CVE-2024-22942, update the TOTOLINK A3300R firmware to a patched version that addresses the command injection issue.
CVE-2024-22942 specifically affects TOTOLINK A3300R firmware version 17.0.0cu.557_B20221024.
Yes, CVE-2024-22942 can be exploited remotely through the affected setWanCfg function using the hostName parameter.
Exploitation of CVE-2024-22942 could allow an attacker to execute arbitrary commands on the affected device.