Discover the command injection vulnerability in TOTOLINK N350RT V9.3.5u.6139_B20201216 and learn about its impact, technical details, and mitigation steps. Stay protected from unauthorized command execution.
TOTOLINK N350RT V9.3.5u.6139_B20201216 was discovered to contain a command injection vulnerability via the command parameter in the function setTracerouteCfg.
Understanding CVE-2022-36487
This CVE identifies a command injection vulnerability in TOTOLINK N350RT V9.3.5u.6139_B20201216.
What is CVE-2022-36487?
The vulnerability in TOTOLINK N350RT V9.3.5u.6139_B20201216 allows attackers to execute commands via the command parameter in setTracerouteCfg.
The Impact of CVE-2022-36487
Exploitation of this vulnerability could result in unauthorized command execution and potential compromise of the affected system.
Technical Details of CVE-2022-36487
This section covers technical details of the vulnerability.
Vulnerability Description
The vulnerability lies in the handling of the command parameter in the setTracerouteCfg function of TOTOLINK N350RT V9.3.5u.6139_B20201216.
Affected Systems and Versions
TOTOLINK N350RT V9.3.5u.6139_B20201216 is confirmed to be affected by this vulnerability.
Exploitation Mechanism
Attackers can exploit this vulnerability by injecting malicious commands via the command parameter during the execution of setTracerouteCfg.
Mitigation and Prevention
To protect systems from CVE-2022-36487, immediate action is necessary.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Check for official patches and updates from TOTOLINK to address the command injection vulnerability in N350RT V9.3.5u.6139_B20201216.