⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2022-26186

CWE-77Command Injection5 documents5 sources
Severity
9.8CRITICAL
EPSS
10.5%
top 6.73%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMar 22
Latest updateApr 5

Description

TOTOLINK N600R V4.3.0cu.7570_B20200620 was discovered to contain a command injection vulnerability via the exportOvpn interface at cstecgi.cgi.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVDtotolink/n600r_firmware4.3.0cu.7570_b20200620

🔴Vulnerability Details

3
GHSA
GHSA-pm89-xmvf-hr23: TOTOLINK N600R V42022-03-23
CVEList
CVE-2022-26186: TOTOLINK N600R V42022-03-22
VulnCheck
totolink n600r_firmware Improper Neutralization of Special Elements used in a Command ('Command Injection')2022

🔍Detection Rules

1
Suricata
ET EXPLOIT Totolink - Command Injection Attempt Inbound (CVE-2022-26186)2022-04-05
CVE-2022-26186 (CRITICAL CVSS 9.8) | TOTOLINK N600R V4.3.0cu.7570_B20200 | cvebase.io