Four format string injection vulnerabilities exist in the web interface /action/wirelessConnect functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9Z and 6.9X. A specially-crafted HTTP request can lead to memory corruption, information disclosure and denial of service. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability arises from format string injection via the `default_key_id` HTTP parameter, as used within the `/action/wirelessConnect` handler.
History

Tue, 15 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2025-04-15T18:41:27.106Z

Reserved: 2022-07-15T00:00:00.000Z

Link: CVE-2022-35887

cve-icon Vulnrichment

Updated: 2024-08-03T09:44:22.151Z

cve-icon NVD

Status : Modified

Published: 2022-10-25T17:15:55.150

Modified: 2024-11-21T07:11:53.123

Link: CVE-2022-35887

cve-icon Redhat

No data.