Vulnerability Description
Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the time and time zone function via the h_primary_ntp_server, h_backup_ntp_server, and h_time_zone parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Commscope | Arris Tr3300 Firmware | 1.0.13 |
| Commscope | Arris Tr3300 | - |
Related Weaknesses (CWE)
References
- https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_12/12.mdExploitThird Party Advisory
- https://github.com/wudipjq/my_vuln/blob/main/ARRIS/vuln_12/12.mdExploitThird Party Advisory
FAQ
What is CVE-2022-27000?
CVE-2022-27000 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Arris TR3300 v1.0.13 was discovered to contain a command injection vulnerability in the time and time zone function via the h_primary_ntp_server, h_backup_ntp_server, and h_time_zone parameters. This ...
How severe is CVE-2022-27000?
CVE-2022-27000 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-27000?
Check the references section above for vendor advisories and patch information. Affected products include: Commscope Arris Tr3300 Firmware, Commscope Arris Tr3300.