⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.
Severity
9.8CRITICAL
EPSS
29.9%
top 3.35%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedMar 15
Latest updateApr 5

Description

Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setUpgradeFW, via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages6 packages

NVDtotolink/a800r_firmware4.1.2cu.5137_b20200730
NVDtotolink/a810r_firmware4.1.2cu.5182_b20201026
NVDtotolink/a830r_firmware5.9c.4729_b20191112
NVDtotolink/a3100r_firmware4.1.2cu.5050_b20200504
NVDtotolink/a950rg_firmware4.1.2cu.5161_b20200903

🔴Vulnerability Details

3
GHSA
GHSA-c3h9-pm7m-68qp: Totolink A830R V52022-03-17
CVEList
CVE-2022-26210: Totolink A830R V52022-03-15
VulnCheck
totolink a830r_firmware Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')2022

🔍Detection Rules

1
Suricata
ET EXPLOIT Totolink - Command Injection Attempt Inbound (CVE-2022-26210)2022-04-05
CVE-2022-26210 (CRITICAL CVSS 9.8) | Totolink A830R V5.9c.4729_B20191112 | cvebase.io