First published: Fri Dec 01 2023(Updated: )
An issue in TOTOLINK X6000R V9.4.0cu.652_B20230116 and V9.4.0cu.852_B20230719 allows a remote attacker to execute arbitrary code via the command parameter of the setting/setTracerouteCfg component.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Totolink X6000r Firmware | =9.4.0cu.652_b20230116 | |
Totolink X6000r Firmware | =9.4.0cu.852_b20230719 | |
TOTOlink X6000R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43455 is an issue in TOTOLINK X6000R V9.4.0cu.652_B20230116 and V9.4.0cu.852_B20230719 that allows a remote attacker to execute arbitrary code.
CVE-2023-43455 has a severity rating of 9.8, which is considered critical.
TOTOLINK X6000R firmware versions 9.4.0cu.652_B20230116 and 9.4.0cu.852_B20230719 are affected by CVE-2023-43455.
A remote attacker can exploit CVE-2023-43455 by using the command parameter of the setting/setTracerouteCfg component.
No, TOTOlink X6000R is not vulnerable to CVE-2023-43455.