### [CVE-2022-33194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33194) ![](https://img.shields.io/static/v1?label=Product&message=iota%20All-In-One%20Security%20Kit&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%206.9X%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brighgreen) ### Description Four OS command injection vulnerabilities exist in the XCMD testWifiAP functionality of Abode Systems, Inc. iota All-In-One Security Kit 6.9X and 6.9Z. A XCMD can lead to arbitrary command execution. An attacker can send a sequence of malicious commands to trigger these vulnerabilities.This vulnerability focuses on the unsafe use of the `WL_Key` and `WL_DefaultKeyID` configuration values in the function located at offset `0x1c7d28` of firmware 6.9Z , and even more specifically on the command execution occuring at offset `0x1c7f6c`. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559 - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1559 #### Github No PoCs found on GitHub currently.