⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2022-25075OS Command Injection in A3000ru Firmware

Severity
9.8CRITICALNVD
GHSA6.1
EPSS
35.8%
top 2.92%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedFeb 24
Latest updateJan 4

Description

TOTOLink A3000RU V5.9c.2280_B20180512 was discovered to contain a command injection vulnerability in the "Main" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVDtotolink/a3000ru_firmwarev5.9c.2280_b20180512

Patches

🔴Vulnerability Details

4
GHSA
Gravitee API Management contains Path Traversal2023-01-04
GHSA
GHSA-xxx5-wj7r-x3hv: TOTOLink A3000RU V52022-02-25
CVEList
CVE-2022-25075: TOTOLink A3000RU V52022-02-22
VulnCheck
totolink a3000ru_firmware Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')2022

🔍Detection Rules

1
Suricata
ET EXPLOIT Totolink - Command Injection Attempt Inbound (CVE-2022-25075)2022-04-05
CVE-2022-25075 — OS Command Injection | cvebase