Vulnerability Description
A command injection in the command parameter of Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to execute arbitrary commands via a crafted POST request.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Razer | Sila Firmware | 2.0.441_api-2.0.418 |
| Razer | Sila | - |
Related Weaknesses (CWE)
References
- https://packetstormsecurity.com/files/166684/Razer-Sila-2.0.418-Command-InjectioExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/50865ExploitThird Party AdvisoryVDB Entry
- https://www2.razer.com/ap-en/desktops-and-networking/razer-silaProductVendor Advisory
- https://packetstormsecurity.com/files/166684/Razer-Sila-2.0.418-Command-InjectioExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/50865ExploitThird Party AdvisoryVDB Entry
- https://www2.razer.com/ap-en/desktops-and-networking/razer-silaProductVendor Advisory
FAQ
What is CVE-2022-29013?
CVE-2022-29013 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A command injection in the command parameter of Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to execute arbitrary commands via a crafted POST request.
How severe is CVE-2022-29013?
CVE-2022-29013 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-29013?
Check the references section above for vendor advisories and patch information. Affected products include: Razer Sila Firmware, Razer Sila.