Netcommunity OG410X and OG810X series (Netcommunity OG410Xa, OG410Xi, OG810Xa, and OG810Xi firmware Ver.2.28 and earlier) allow an attacker on the adjacent network to execute an arbitrary OS command via a specially crafted config file.
References
Link | Resource |
---|---|
https://jvn.jp/en/vu/JVNVU94900322/index.html | Third Party Advisory VDB Entry |
https://www.ntt-west.co.jp/smb/kiki_info/info/220322.html | Vendor Advisory |
https://business.ntt-east.co.jp/topics/2022/03_22.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Information
Published : 2022-03-31 01:15
Updated : 2022-04-08 06:23
NVD link : CVE-2022-22986
Mitre link : CVE-2022-22986
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
ntt-east
- og410xa
- og410xi
- og810xi_firmware
- og410xa_firmware
- og810xa_firmware
- og810xa
- og810xi
- og410xi_firmware