First published: Wed Jan 15 2025(Updated: )
TOTOLINK X5000R V9.1.0cu.2350_B20230313 was discovered to contain an OS command injection vulnerability via the "sHour" parameter in setWiFiScheduleCfg.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TOTOLINK X5000R firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57022 is classified as a critical vulnerability due to the potential for remote command execution.
To fix CVE-2024-57022, you should update the TOTOLINK X5000R firmware to the latest version provided by the vendor.
CVE-2024-57022 could allow attackers to execute arbitrary OS commands, leading to unauthorized access or control over the device.
CVE-2024-57022 affects the TOTOLINK X5000R router with the firmware version V9.1.0cu.2350_B20230313.
The attack vector for CVE-2024-57022 is through the 'sHour' parameter in the setWiFiScheduleCfg function.