First published: Mon Aug 29 2022(Updated: )
TOTOLINK A7000R V4.1cu.4134 was discovered to contain an access control issue via /cgi-bin/ExportSettings.sh.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A7000r Firmware | =4.1cu.4134 | |
TOTOLINK A7000R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32993 is a vulnerability found in TOTOLINK A7000R V4.1cu.4134 firmware, which allows unauthorized access via /cgi-bin/ExportSettings.sh.
CVE-2022-32993 has a severity rating of 9.8 out of 10, making it a critical vulnerability.
CVE-2022-32993 affects TOTOLINK A7000R V4.1cu.4134 firmware, allowing unauthorized access through the /cgi-bin/ExportSettings.sh endpoint.
The affected software version for CVE-2022-32993 is TOTOLINK A7000R V4.1cu.4134 firmware.
Yes, TOTOLINK A7000R V4.1cu.4134 firmware is vulnerable to CVE-2022-32993.
You can find more information about CVE-2022-32993 on the TOTOLINK website (http://totolink.com) and the POC repository on GitHub (https://github.com/laotun-s/POC/blob/main/CVE-2022-32993.txt).