First published: Fri Dec 01 2023(Updated: )
An issue in TOTOLINK X6000R V9.4.0cu.652_B20230116 and V9.4.0cu.852_B20230719 allows a remote attacker to execute arbitrary code via the hostName parameter of the switchOpMode component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Totolink X6000r Firmware | =9.4.0cu.652_b20230116 | |
Totolink X6000r Firmware | =9.4.0cu.852_b20230719 | |
TOTOlink X6000R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-43454 is critical with a score of 9.8.
A remote attacker can exploit CVE-2023-43454 by using the hostName parameter of the switchOpMode component to execute arbitrary code.
The versions V9.4.0cu.652_B20230116 and V9.4.0cu.852_B20230719 of TOTOLINK X6000R firmware are affected by CVE-2023-43454.
No, TOTOLINK X6000R is not vulnerable to CVE-2023-43454.
There is no information available regarding a fix for CVE-2023-43454. It is recommended to follow the vendor's security advisories for updates.