First published: Fri Feb 03 2023(Updated: )
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagHost parameter in the setNetworkDiag function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink Ca300-poe Firmware | =6.2c.884 | |
TOTOLINK CA300-PoE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24139 is a command injection vulnerability in the TOTOLINK CA300-PoE V6.2c.884 firmware.
CVE-2023-24139 has a severity rating of 9.8 out of 10, which is classified as critical.
CVE-2023-24139 affects TOTOLINK CA300-PoE V6.2c.884 firmware by allowing an attacker to inject commands via the NetDiagHost parameter in the setNetworkDiag function.
To fix the CVE-2023-24139 vulnerability, users should update their TOTOLINK CA300-PoE firmware to a version that does not contain the vulnerability.
You can find more information about CVE-2023-24139 at the following link: [https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setNetworkDiag_NetDiagHost/setNetworkDiag_NetDiagHost.md](https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_ca300-poe/setNetworkDiag_NetDiagHost/setNetworkDiag_NetDiagHost.md)