First published: Wed May 31 2023(Updated: )
TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contains a post-authentication buffer overflow via parameter sPort/ePort in the addEffect function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
TOTOLINK X5000R firmware | =9.1.0u.6118_b20201102 | |
TOTOLINK X5000R firmware | ||
All of | ||
TOTOLINK X5000R firmware | =9.1.0u.6369_b20230113 | |
TOTOLINK X5000R firmware | ||
TOTOLINK X5000R firmware | =9.1.0u.6118_b20201102 | |
TOTOLINK X5000R firmware | ||
TOTOLINK X5000R firmware | =9.1.0u.6369_b20230113 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for TOTOLINK X5000R is CVE-2023-33485.
The severity of CVE-2023-33485 is high (8.8).
The affected software for CVE-2023-33485 is TOTOLINK X5000R with firmware versions 9.1.0u.6118_B20201102 and 9.1.0u.6369_B20230113.
The vulnerability in TOTOLINK X5000R occurs due to a post-authentication buffer overflow when the parameter sPort/ePort is used in the addEffect function.
Yes, TOTOLINK X5000R with firmware versions 9.1.0u.6118_B20201102 and 9.1.0u.6369_B20230113 is vulnerable to CVE-2023-33485.