Total
1788 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-46422 | 1 Totolink | 2 X6000r, X6000r Firmware | 2024-09-11 | N/A | 9.8 CRITICAL |
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_411994 function. | |||||
CVE-2023-46419 | 1 Totolink | 2 X6000r, X6000r Firmware | 2024-09-11 | N/A | 9.8 CRITICAL |
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_415730 function. | |||||
CVE-2023-46418 | 1 Totolink | 2 X6000r, X6000r Firmware | 2024-09-11 | N/A | 9.8 CRITICAL |
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_412688 function. | |||||
CVE-2023-46414 | 1 Totolink | 2 X6000r, X6000r Firmware | 2024-09-11 | N/A | 9.8 CRITICAL |
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_ 41D494 function. | |||||
CVE-2023-46420 | 1 Totolink | 2 X6000r, X6000r Firmware | 2024-09-11 | N/A | 9.8 CRITICAL |
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_41590C function. | |||||
CVE-2023-46421 | 1 Totolink | 2 X6000r, X6000r Firmware | 2024-09-11 | N/A | 9.8 CRITICAL |
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a remote command execution (RCE) vulnerability via the sub_411D00 function. | |||||
CVE-2024-7436 | 1 Dlink | 2 Di-8100, Di-8100 Firmware | 2024-09-11 | N/A | 8.8 HIGH |
A vulnerability, which was classified as critical, has been found in D-Link DI-8100 16.07. This issue affects the function msp_info_htm of the file msp_info.htm. The manipulation of the argument cmd leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273521 was assigned to this vulnerability. | |||||
CVE-2024-21903 | 1 Qnap | 2 Qts, Quts Hero | 2024-09-11 | N/A | 4.7 MEDIUM |
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network. We have already fixed the vulnerability in the following versions: QTS 5.1.6.2722 build 20240402 and later QuTS hero h5.1.6.2734 build 20240414 and later | |||||
CVE-2024-22651 | 1 Dlink | 2 Dir-815, Dir-815 Firmware | 2024-09-10 | N/A | 9.8 CRITICAL |
There is a command injection vulnerability in the ssdpcgi_main function of cgibin binary in D-Link DIR-815 router firmware v1.04. | |||||
CVE-2024-44410 | 1 Dlink | 2 Di-8300, Di-8300 Firmware | 2024-09-10 | N/A | 9.8 CRITICAL |
D-Link DI-8300 v16.07.26A1 is vulnerable to command injection via the upgrade_filter_asp function. | |||||
CVE-2024-44402 | 1 Dlink | 2 Di-8100g, Di-8100g Firmware | 2024-09-10 | N/A | 9.8 CRITICAL |
D-Link DI-8100G 17.12.20A1 is vulnerable to Command Injection via msp_info.htm. | |||||
CVE-2024-42348 | 1 Fogproject | 1 Fogproject | 2024-09-10 | N/A | 8.6 HIGH |
FOG is a cloning/imaging/rescue suite/inventory management system. FOG Server 1.5.10.41.2 can leak AD username and password when registering a computer. This vulnerability is fixed in 1.5.10.41.3 and 1.6.0-beta.1395. | |||||
CVE-2023-26310 | 1 Oppo | 2 Coloros, Find X3 | 2024-09-10 | N/A | 9.8 CRITICAL |
There is a command injection problem in the old version of the mobile phone backup app. | |||||
CVE-2024-4884 | 1 Progress | 1 Whatsup Gold | 2024-09-06 | N/A | 9.8 CRITICAL |
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The Apm.UI.Areas.APM.Controllers.CommunityController allows execution of commands with iisapppool\nmconsole privileges. | |||||
CVE-2024-39568 | 1 Siemens | 1 Sinema Remote Connect Client | 2024-09-06 | N/A | 7.8 HIGH |
A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading proxy configurations. This could allow an authenticated local attacker to execute arbitrary code with system privileges. | |||||
CVE-2024-39569 | 1 Siemens | 1 Sinema Remote Connect Client | 2024-09-06 | N/A | 7.2 HIGH |
A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 HF1). The system service of affected applications is vulnerable to command injection due to missing server side input sanitation when loading VPN configurations. This could allow an administrative remote attacker running a corresponding SINEMA Remote Connect Server to execute arbitrary code with system privileges on the client system. | |||||
CVE-2024-39570 | 1 Siemens | 1 Sinema Remote Connect Server | 2024-09-06 | N/A | 8.8 HIGH |
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 HF1). Affected applications are vulnerable to command injection due to missing server side input sanitation when loading VxLAN configurations. This could allow an authenticated attacker to execute arbitrary code with root privileges. | |||||
CVE-2024-39571 | 1 Siemens | 1 Sinema Remote Connect Server | 2024-09-06 | N/A | 8.8 HIGH |
A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.2 HF1). Affected applications are vulnerable to command injection due to missing server side input sanitation when loading SNMP configurations. This could allow an attacker with the right to modify the SNMP configuration to execute arbitrary code with root privileges. | |||||
CVE-2023-46993 | 1 Totolink | 2 A3300r, A3300r Firmware | 2024-09-06 | N/A | 9.8 CRITICAL |
In TOTOLINK A3300R V17.0.0cu.557_B20221024 when dealing with setLedCfg request, there is no verification for the enable parameter, which can lead to command injection. | |||||
CVE-2023-46485 | 1 Totolink | 2 X6000r, X6000r Firmware | 2024-09-06 | N/A | 9.8 CRITICAL |
An issue in TOTOlink X6000R V9.4.0cu.852_B20230719 allows a remote attacker to execute arbitrary code via the setTracerouteCfg function of the stecgi.cgi component. |