An unauthenticated command injection vulnerability in the product license validation function of Telos Alliance Omnia MPX Node 1.3.* - 1.4.* allows attackers to execute arbitrary commands via a crafted payload injected into the license input.
                
            References
                    | Link | Resource | 
|---|---|
| https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-43325 | Exploit Third Party Advisory | 
| https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-43325 | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Configuration 2 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 07:26
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://cyber-guy.gitbook.io/cyber-guys-blog/pocs/cve-2022-43325 - Exploit, Third Party Advisory | 
Information
                Published : 2022-12-02 02:15
Updated : 2025-04-24 20:15
NVD link : CVE-2022-43325
Mitre link : CVE-2022-43325
CVE.ORG link : CVE-2022-43325
JSON object : View
Products Affected
                telosalliance
- omnia_mpx_node
- omnia_mpx_node_firmware
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
