A vulnerability, which was classified as critical, was found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023. This affects the function setDiagnosisCfg. The manipulation leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237513 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.237513 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.237513 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
23 Aug 2023, 19:39
Type | Values Removed | Values Added |
---|---|---|
First Time |
Totolink
Totolink ex1200l Firmware Totolink ex1200l |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:h:totolink:ex1200l:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:ex1200l_firmware:9.3.5u.6146_b20201023:*:*:*:*:*:*:* |
|
References | (MISC) https://vuldb.com/?id.237513 - Third Party Advisory | |
References | (MISC) https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 - Exploit, Third Party Advisory | |
References | (MISC) https://vuldb.com/?ctiid.237513 - Permissions Required, Third Party Advisory |
18 Aug 2023, 15:06
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-18 14:15
Updated : 2024-04-11 01:22
NVD link : CVE-2023-4410
Mitre link : CVE-2023-4410
CVE.ORG link : CVE-2023-4410
JSON object : View
Products Affected
totolink
- ex1200l
- ex1200l_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')