First published: Fri Apr 14 2023(Updated: )
TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain multiple command injection vulnerabilities via the rtLogEnabled and rtLogServer parameters in the setSyslogCfg function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink X18 Firmware | =9.1.0cu.2024_b20220329 | |
TOTOLINK X18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-29801 is critical with a severity value of 9.8.
CVE-2023-29801 refers to a command injection vulnerability found in TOTOLINK X18 V9.1.0cu.2024_B20220329 firmware.
CVE-2023-29801 affects TOTOLINK X18 by allowing attackers to execute arbitrary commands via the rtLogEnabled and rtLogServer parameters in the setSyslogCfg function.
To fix the CVE-2023-29801 vulnerability, it is recommended to update the TOTOLINK X18 firmware to a patched version provided by the vendor.
Additional information about CVE-2023-29801 can be found at the following reference: [https://sore-pail-31b.notion.site/Command-Injection-2-af41252fe96244209589d4e6da9aa7b7]