Netcommunity OG410X and OG810X series (Netcommunity OG410Xa, OG410Xi, OG810Xa, and OG810Xi firmware Ver.2.28 and earlier) allow an attacker on the adjacent network to execute an arbitrary OS command via a specially crafted config file.
                
            References
                    | Link | Resource | 
|---|---|
| https://business.ntt-east.co.jp/topics/2022/03_22.html | Vendor Advisory | 
| https://jvn.jp/en/vu/JVNVU94900322/index.html | Third Party Advisory VDB Entry | 
| https://www.ntt-west.co.jp/smb/kiki_info/info/220322.html | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
Configuration 2 (hide)
| AND | 
            
            
 
  | 
    
Configuration 3 (hide)
| AND | 
            
            
 
  | 
    
Configuration 4 (hide)
| AND | 
            
            
 
  | 
    
History
                    No history.
Information
                Published : 2022-03-31 08:15
Updated : 2022-04-08 13:23
NVD link : CVE-2022-22986
Mitre link : CVE-2022-22986
CVE.ORG link : CVE-2022-22986
JSON object : View
Products Affected
                ntt-east
- og410xa
 - og810xi
 - og410xi_firmware
 - og810xa_firmware
 - og810xi_firmware
 - og810xa
 - og410xa_firmware
 - og410xi
 
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
