{ "schema_version": "1.4.0", "id": "GHSA-c3h9-pm7m-68qp", "modified": "2022-03-23T00:00:37Z", "published": "2022-03-17T00:00:55Z", "aliases": [ "CVE-2022-26210" ], "details": "Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setUpgradeFW, via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26210" }, { "type": "WEB", "url": "https://github.com/pjqwudi1/my_vuln/blob/main/totolink/vuln_23/23.md" } ], "database_specific": { "cwe_ids": [ "CWE-77" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-03-15T22:15:00Z" } }