Логотип exploitDog
bind:CVE-2025-2688
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-2688

Количество 3

Количество 3

nvd логотип

CVE-2025-2688

11 месяцев назад

A vulnerability classified as problematic was found in TOTOLINK A3000RU up to 5.9c.5185. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ExportSyslog.sh of the component Syslog Configuration File Handler. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-4xp6-5525-gxpx

11 месяцев назад

A vulnerability classified as problematic was found in TOTOLINK A3000RU up to 5.9c.5185. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ExportSyslog.sh of the component Syslog Configuration File Handler. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2025-05843

11 месяцев назад

Уязвимость файла /cgi-bin/ExportSyslog.sh микропрограммного обеспечения роутеров TOTOLINK A3000RU, позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-2688

A vulnerability classified as problematic was found in TOTOLINK A3000RU up to 5.9c.5185. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ExportSyslog.sh of the component Syslog Configuration File Handler. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.

CVSS3: 4.3
0%
Низкий
11 месяцев назад
github логотип
GHSA-4xp6-5525-gxpx

A vulnerability classified as problematic was found in TOTOLINK A3000RU up to 5.9c.5185. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ExportSyslog.sh of the component Syslog Configuration File Handler. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.

CVSS3: 4.3
0%
Низкий
11 месяцев назад
fstec логотип
BDU:2025-05843

Уязвимость файла /cgi-bin/ExportSyslog.sh микропрограммного обеспечения роутеров TOTOLINK A3000RU, позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 4.3
0%
Низкий
11 месяцев назад

Уязвимостей на страницу