Filtered by vendor Totolink
Subscriptions
Filtered by product Ex200 Firmware
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-53333 | 1 Totolink | 1 Ex200 Firmware | 2024-11-26 | 6.3 Medium |
TOTOLINK EX200 v4.0.3c.7646_B20201211 was found to contain a command insertion vulnerability in the setUssd function. This vulnerability allows an attacker to execute arbitrary commands via the "ussd" parameter. | ||||
CVE-2024-31815 | 1 Totolink | 1 Ex200 Firmware | 2024-11-21 | 9.1 Critical |
In TOTOLINK EX200 V4.0.3c.7314_B20191204, an attacker can obtain the configuration file without authorization through /cgi-bin/ExportSettings.sh | ||||
CVE-2024-31813 | 1 Totolink | 1 Ex200 Firmware | 2024-11-21 | 8.4 High |
TOTOLINK EX200 V4.0.3c.7646_B20201211 does not contain an authentication mechanism by default. | ||||
CVE-2021-43711 | 1 Totolink | 2 Ex200, Ex200 Firmware | 2024-11-21 | 9.8 Critical |
The downloadFlile.cgi binary file in TOTOLINK EX200 V4.0.3c.7646_B20201211 has a command injection vulnerability when receiving GET parameters. The parameter name can be constructed for unauthenticated command execution. | ||||
CVE-2024-7336 | 1 Totolink | 2 Ex200, Ex200 Firmware | 2024-08-09 | 8.8 High |
A vulnerability classified as critical was found in TOTOLINK EX200 4.0.3c.7646_B20201211. Affected by this vulnerability is the function loginauth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273259. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | ||||
CVE-2024-7335 | 1 Totolink | 2 Ex200, Ex200 Firmware | 2024-08-09 | 8.8 High |
A vulnerability classified as critical has been found in TOTOLINK EX200 4.0.3c.7646_B20201211. Affected is the function getSaveConfig of the file /cgi-bin/cstecgi.cgi?action=save&setting. The manipulation of the argument http_host leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-273258 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
Page 1 of 1.