Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4xp6-5525-gxpx

Опубликовано: 24 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.3
CVSS3: 4.3

Описание

A vulnerability classified as problematic was found in TOTOLINK A3000RU up to 5.9c.5185. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ExportSyslog.sh of the component Syslog Configuration File Handler. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.

A vulnerability classified as problematic was found in TOTOLINK A3000RU up to 5.9c.5185. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ExportSyslog.sh of the component Syslog Configuration File Handler. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 17%
0.00055
Низкий

5.3 Medium

CVSS4

4.3 Medium

CVSS3

Дефекты

CWE-266

Связанные уязвимости

CVSS3: 4.3
nvd
11 месяцев назад

A vulnerability classified as problematic was found in TOTOLINK A3000RU up to 5.9c.5185. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ExportSyslog.sh of the component Syslog Configuration File Handler. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.

CVSS3: 4.3
fstec
11 месяцев назад

Уязвимость файла /cgi-bin/ExportSyslog.sh микропрограммного обеспечения роутеров TOTOLINK A3000RU, позволяющая нарушителю обойти существующие ограничения безопасности

EPSS

Процентиль: 17%
0.00055
Низкий

5.3 Medium

CVSS4

4.3 Medium

CVSS3

Дефекты

CWE-266