Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3rxg-298f-hp3q

Опубликовано: 18 авг. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 6.3

Описание

A vulnerability was found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 and classified as critical. This issue affects the function setWanCfg. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-237515. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability was found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 and classified as critical. This issue affects the function setWanCfg. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-237515. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 78%
0.01108
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 6.3
nvd
больше 2 лет назад

A vulnerability was found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 and classified as critical. This issue affects the function setWanCfg. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-237515. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 78%
0.01108
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-78