Vulnerability Description
A command injection vulnerability in the function meshSlaveDlfw of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | T6 Firmware | v4.1.5cu.748_b20211015 |
| Totolink | T6 | - |
| Totolink | T10 Firmware | v4.1.8cu.5207_b20210320 |
| Totolink | T10 | - |
Related Weaknesses (CWE)
References
- https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_16/16.mdBroken LinkThird Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2022-25132Third Party AdvisoryVDB Entry
- https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_16/16.mdBroken LinkThird Party Advisory
FAQ
What is CVE-2022-25132?
CVE-2022-25132 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A command injection vulnerability in the function meshSlaveDlfw of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted M...
How severe is CVE-2022-25132?
CVE-2022-25132 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-25132?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink T6 Firmware, Totolink T6, Totolink T10 Firmware, Totolink T10.