CVE-2021-43711

The downloadFlile.cgi binary file in TOTOLINK EX200 V4.0.3c.7646_B20201211 has a command injection vulnerability when receiving GET parameters. The parameter name can be constructed for unauthenticated command execution.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*
cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*

History

12 Jan 2022, 15:25

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
First Time Totolink
Totolink ex200 Firmware
Totolink ex200
CPE cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*
cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*
CWE CWE-77
References (MISC) https://github.com/doudoudedi/ToTolink_EX200_Cmmand_Execute/blob/main/ToTolink%20EX200%20Comand%20Injection2.md - (MISC) https://github.com/doudoudedi/ToTolink_EX200_Cmmand_Execute/blob/main/ToTolink%20EX200%20Comand%20Injection2.md - Exploit, Third Party Advisory

04 Jan 2022, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-04 14:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-43711

Mitre link : CVE-2021-43711

CVE.ORG link : CVE-2021-43711


JSON object : View

Products Affected

totolink

  • ex200_firmware
  • ex200
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')