First published: Fri Feb 03 2023(Updated: )
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the host_time parameter in the NTPSyncWithHost function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink Ca300-poe Firmware | =6.2c.884 | |
TOTOLINK CA300-PoE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of TOTOLINK CA300-PoE is CVE-2023-24138.
The severity level of CVE-2023-24138 is critical (9.8).
The command injection vulnerability in TOTOLINK CA300-PoE occurs via the host_time parameter in the NTPSyncWithHost function.
TOTOLINK CA300-PoE firmware version 6.2c.884 is affected by CVE-2023-24138.
To fix the command injection vulnerability in TOTOLINK CA300-PoE, update the firmware to a secure version provided by the vendor.