Security for everyone

CVE-2022-25082 Scanner

Detects 'Command Injection' vulnerability in TOTOLink A950RG affects v. 5.9c.4050_B20190424 and 4.1.2cu.5204_B20210112.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2022-25082 Scanner Detail

The TOTOLink A950RG is a wireless router designed for home and office use. It is a powerful device that delivers high-speed internet connectivity and allows seamless access to multiple devices simultaneously. The router is equipped with advanced features, including parental control, guest network access, and VPN support, among others. Its primary function is to provide a reliable and secure network connection to users, but recently, a critical vulnerability was discovered in the product that threatens the security of the network and connected devices.

CVE-2022-25082 is a command injection vulnerability identified in the "Main" function of the TOTOLink A950RG V5.9c.4050_B20190424 and V4.1.2cu.5204_B20210112 routers. The vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter. An attacker can exploit this vulnerability remotely, gain administrative privileges, and compromise the entire network. This vulnerability poses a significant risk to users as the attacker can remotely control the network, intercept confidential data, and launch other malicious activities.

When exploited, CVE-2022-25082 can lead to disastrous consequences. Attackers can steal sensitive information such as passwords, credit card details, and personal data. They can also modify the network settings, install malware, and launch attacks on other networks. In the worst-case scenario, the attacker can gain complete control over the network, leading to the disruption of services and causing huge financial losses. provides expert guidance and insights into the latest vulnerabilities discovered in digital assets. It offers a comprehensive platform that provides real-time information on the latest threats, alerts, and updates. Through its pro features, users can effortlessly ascertain the security posture of their networks and identify vulnerabilities in their digital assets. By subscribing to their services, users can stay updated with the latest security trends and take proactive measures to protect their networks and devices from malicious activities.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture