A vulnerability, which was classified as critical, was found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023. This affects the function setDiagnosisCfg. The manipulation leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237513 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.237513 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.237513 | Third Party Advisory |
https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
23 Aug 2023, 19:39
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://vuldb.com/?ctiid.237513 - Permissions Required, Third Party Advisory | |
References | (MISC) https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 - Exploit, Third Party Advisory | |
References | (MISC) https://vuldb.com/?id.237513 - Third Party Advisory | |
First Time |
Totolink ex1200l Firmware
Totolink ex1200l Totolink |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:o:totolink:ex1200l_firmware:9.3.5u.6146_b20201023:*:*:*:*:*:*:* cpe:2.3:h:totolink:ex1200l:-:*:*:*:*:*:*:* |
18 Aug 2023, 15:06
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-18 14:15
Updated : 2024-05-17 02:31
NVD link : CVE-2023-4410
Mitre link : CVE-2023-4410
JSON object : View
Products Affected
totolink
- ex1200l
- ex1200l_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')