### [CVE-2022-26210](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26210) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Totolink A830R V5.9c.4729_B20191112, A3100R V4.1.2cu.5050_B20200504, A950RG V4.1.2cu.5161_B20200903, A800R V4.1.2cu.5137_B20200730, A3000RU V5.9c.5185_B20201128, and A810R V4.1.2cu.5182_B20201026 were discovered to contain a command injection vulnerability in the function setUpgradeFW, via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. ### POC #### Reference No PoCs from references. #### Github - https://github.com/20142995/Goby - https://github.com/ARPSyndicate/cvemon - https://github.com/ExploitPwner/Totolink-CVE-2022-Exploits - https://github.com/HimmelAward/Goby_POC - https://github.com/Z0fhack/Goby_POC - https://github.com/pjqwudi/my_vuln