Learn about CVE-2022-36479, a command injection vulnerability in TOTOLINK N350RT V9.3.5u.6139_B20201216 router via the host_time parameter in NTPSyncWithHost function. Discover impact, mitigation strategies, and prevention steps.
TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a command injection vulnerability via the host_time parameter in the function NTPSyncWithHost.
Understanding CVE-2022-36479
This CVE involves a command injection vulnerability found in the TOTOLINK N350RT V9.3.5u.6139_B20201216 router.
What is CVE-2022-36479?
CVE-2022-36479 is a security vulnerability that allows attackers to inject commands via the host_time parameter, specifically within the NTPSyncWithHost function.
The Impact of CVE-2022-36479
This vulnerability could be exploited by malicious actors to execute arbitrary commands on the affected TOTOLINK N350RT V9.3.5u.6139_B20201216 router, leading to potential unauthorized access and control.
Technical Details of CVE-2022-36479
Here are some technical details regarding this CVE:
Vulnerability Description
The vulnerability lies in the handling of the host_time parameter within the NTPSyncWithHost function, enabling attackers to inject and execute commands.
Affected Systems and Versions
The TOTOLINK N350RT V9.3.5u.6139_B20201216 router is affected by this vulnerability.
Exploitation Mechanism
Attackers can exploit this vulnerability by manipulating the host_time parameter to execute unauthorized commands on the router.
Mitigation and Prevention
To mitigate the risks associated with CVE-2022-36479, the following steps are recommended:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates