First published: Tue Nov 24 2020(Updated: )
An issue was discovered on TOTOLINK A850R-V1 through 1.0.1-B20150707.1612 and F1-V2 through 1.1-B20150708.1646 devices. By sending a specific hel,xasf packet to the WAN interface, it is possible to open the web management interface on the WAN interface.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A850R-V1 Firmware | <1.0.1-b20150707.1612 | |
Totolink A850R-V1 Firmware | ||
Totolink F1-v2 | <2.1.1-b20150708.1646 | |
Totolink F1-v2 Firmware | ||
Totolink F2-v1 | <2.1.0-b20150320.1611 | |
Totolink F2-v1 Firmware | ||
Totolink N150rt | <2.1.1-b20150708.1548 | |
Totolink N150rt-v2 Firmware | ||
Totolink N151rt-v2 | <1.1-b20150708.1559 | |
Totolink N151rt-v2 Firmware | ||
Totolink N300RH-v2 | <2.0.1-b20150708.1625 | |
Totolink N300rh-v2 Firmware | ||
Totolink N300RH-v3 Firmware | <3.0.0-b20150331.0858 | |
Totolink N300RH-v3 Firmware | ||
Totolink N300rt-v2 Firmware | <2.1.1-b20150708.1613 | |
Totolink N300rt-v2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-9550 is considered a high severity vulnerability as it allows unauthorized access to the web management interface.
To mitigate CVE-2015-9550, it is recommended to update the firmware to a version that is not affected by the vulnerability.
CVE-2015-9550 affects TOTOLINK A850R-V1 and F1-V2 routers running specific firmware versions.
CVE-2015-9550 is associated with a remote code execution attack that can be triggered by sending a specific packet to the WAN interface.
Yes, there is a known exploit for CVE-2015-9550 that involves sending a crafted hel,xasf packet to access the vulnerable web interface.