
Cloud Vulnerability DB
A community-led vulnerabilities database
An OS command injection vulnerability exists in the web interface utilsetabodecode functionality of Abode Systems, Inc. iota All-In-One Security Kit versions 6.9X and 6.9Z. The vulnerability, tracked as CVE-2022-27804 (TALOS-2022-1567), was discovered by Matt Wiseman of Cisco Talos and publicly disclosed on October 20, 2022 ([Talos Report](https://www.talosintelligence.com/vulnerabilityreports/TALOS-2022-1567)).
The vulnerability exists in the /action/factorySerialMacPost endpoint, which uses the utilssetabodecode function to modify the U-Boot environment. The function improperly handles user input when setting the ABODECODE parameter, allowing for command injection. The vulnerability has been assigned a CVSSv3 score of 8.0 (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H) and is classified as CWE-78 (Improper Neutralization of Special Elements used in an OS Command) (Talos Report).
A successful exploitation of this vulnerability could lead to arbitrary command execution with root privileges on the affected device. This could potentially allow attackers to take control of the security system, manipulate device configurations, and execute malicious commands (Talos Blog).
Abode Systems has released a patch to address this vulnerability. Users of the affected iota All-In-One Security Kit versions 6.9X and 6.9Z are encouraged to update their devices to the latest version as soon as possible. The vendor patch was released on September 26, 2022 (Talos Report).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."