### [CVE-2022-32449](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32449) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description TOTOLINK EX300_V2 V4.0.3c.7484 was discovered to contain a command injection vulnerability via the langType parameter in the setLanguageCfg function. This vulnerability is exploitable via a crafted MQTT data packet. ### POC #### Reference - https://github.com/winmt/CVE/blob/main/TOTOLINK%20EX300_V2/README.md #### Github No PoCs found on GitHub currently.