First published: Fri Feb 03 2023(Updated: )
A command injection vulnerability in the version parameter in the function recvSlaveCloudCheckStatus of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink T8 Firmware | =v4.1.5cu | |
TOTOLINK T8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24153 has been classified as a critical severity vulnerability due to its potential to allow arbitrary command execution.
To mitigate CVE-2023-24153, update the affected TOTOLINK T8 firmware to a version that addresses this vulnerability.
CVE-2023-24153 specifically affects the TOTOLINK T8 firmware version 4.1.5cu.
Yes, CVE-2023-24153 can be exploited remotely through specially crafted MQTT packets.
CVE-2023-24153 is associated with command injection attacks, allowing unauthorized command execution on the device.