Learn about CVE-2022-30547, a critical directory traversal vulnerability in WWBN AVideo versions 11.6 and dev master commit 3f7c0364, allowing arbitrary command execution via crafted HTTP requests.
A directory traversal vulnerability exists in WWBN AVideo affecting versions 11.6 and dev master commit 3f7c0364, allowing arbitrary command execution via a specially-crafted HTTP request.
Understanding CVE-2022-30547
This CVE involves a critical path traversal vulnerability in WWBN AVideo, with a base CVSS score of 9.9.
What is CVE-2022-30547?
CVE-2022-30547 is a directory traversal vulnerability in the unzipDirectory function of WWBN AVideo versions 11.6 and dev master commit 3f7c0364. An attacker can exploit this issue by sending a crafted HTTP request leading to arbitrary command execution.
The Impact of CVE-2022-30547
This vulnerability has a critical base severity level, with high impacts on confidentiality, integrity, and availability of the affected systems.
Technical Details of CVE-2022-30547
This section outlines the vulnerability description, affected systems, and the exploitation mechanism.
Vulnerability Description
The vulnerability allows attackers to execute arbitrary commands by manipulating HTTP requests, posing a significant threat to system security.
Affected Systems and Versions
WWBN AVideo versions 11.6 and dev master commit 3f7c0364 are impacted by this vulnerability, exposing them to potential exploitation.
Exploitation Mechanism
By sending a maliciously-crafted HTTP request to the unzipDirectory function, threat actors can exploit the vulnerability to execute unauthorized commands.
Mitigation and Prevention
To address CVE-2022-30547, immediate steps, long-term security practices, and patching measures are crucial.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security updates from WWBN and promptly apply patches to remediate the vulnerability.