Check Point Reference: | CPAI-2022-0864 |
Date Published: | 20 Nov 2022 |
Severity: | Critical |
Last Updated: | Sunday 04 December, 2022 |
Source: | |
Industry Reference: | CVE-2022-26206 CVE-2022-26207 CVE-2022-26208 CVE-2022-26209 CVE-2022-26210 CVE-2022-26211 CVE-2022-26212 CVE-2022-26214 CVE-2022-27003 CVE-2022-27004 CVE-2022-27005 CVE-2022-28935 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | TOTOLINK Router X5000R V9.1.0u.6118_B20201102 TOTOLINK Router A7000R V9.1.0u.6115_B20201022 TOTOLINK Router A830R V5.9c.4729_b20191112 TOTOLINK Router A3100R V4.1.2cu.5050_B20200504 TOTOLINK Router A950RG V4.1.2cu.5161_B20200903 TOTOLINK Router A800R V4.1.2cu.5137_B20200730 TOTOLINK Router A3000RU V5.9c.5185_B20201128 TOTOLINK Router A810R V4.1.2cu.5182_B20201026 |
Vulnerability Description | A command injection vulnerability exists in TOTOLINK Routers. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary commands on the affected system. |
This protection detects attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: TOTOLINK Routers Command Injection