Vulnerability Description
A command injection vulnerability in the function setUpgradeFW of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQTT packet.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | T6 Firmware | v4.1.5cu.748_b20211015 |
| Totolink | T6 | - |
Related Weaknesses (CWE)
References
- https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_13/13.mdBroken LinkThird Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/220083Third Party AdvisoryVDB Entry
- https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_13/13.mdBroken LinkThird Party Advisory
FAQ
What is CVE-2022-25134?
CVE-2022-25134 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A command injection vulnerability in the function setUpgradeFW of TOTOLINK Technology router T6 V3_Firmware T6_V3_V4.1.5cu.748_B20211015 allows attackers to execute arbitrary commands via a crafted MQ...
How severe is CVE-2022-25134?
CVE-2022-25134 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-25134?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink T6 Firmware, Totolink T6.