⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2022-25134Command Injection in T6 Firmware

CWE-77Command Injection5 documents5 sources
Severity
9.8CRITICALNVD
EPSS
4.5%
top 10.90%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedFeb 19
Latest updateFeb 20

Description

A command injection vulnerability in the function setUpgradeFW of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVDtotolink/t6_firmwarev4.1.5cu.748_b20211015

🔴Vulnerability Details

3
GHSA
GHSA-p978-563h-q2jg: A command injection vulnerability in the function setUpgradeFW of TOTOLINK Technology router T6 V3_Firmware T6_V3_V42022-02-20
CVEList
CVE-2022-25134: A command injection vulnerability in the function setUpgradeFW of TOTOLINK Technology router T6 V3_Firmware T6_V3_V42022-02-18
VulnCheck
totolink t6_firmware Improper Neutralization of Special Elements used in a Command ('Command Injection')2022