Vulnerability Description
A command injection vulnerability in the function isAssocPriDevice of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | T6 Firmware | v4.1.5cu.748_b20211015 |
| Totolink | T6 | - |
Related Weaknesses (CWE)
References
- https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_20/20.mdBroken LinkThird Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/220084Third Party AdvisoryVDB Entry
- https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_20/20.mdBroken LinkThird Party Advisory
FAQ
What is CVE-2022-25133?
CVE-2022-25133 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A command injection vulnerability in the function isAssocPriDevice of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafte...
How severe is CVE-2022-25133?
CVE-2022-25133 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-25133?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink T6 Firmware, Totolink T6.