First published: Fri Aug 18 2023(Updated: )
A vulnerability, which was classified as critical, was found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023. This affects the function setDiagnosisCfg. The manipulation leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237513 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink Ex1200l Firmware | =9.3.5u.6146_b20201023 | |
TOTOLINK EX1200L | ||
All of | ||
Totolink Ex1200l Firmware | =9.3.5u.6146_b20201023 | |
TOTOLINK EX1200L |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-4410 is critical with a CVSS score of 9.8.
TOTOLINK EX1200L firmware version 9.3.5u.6146_B20201023 is affected by CVE-2023-4410.
CVE-2023-4410 is a command injection vulnerability.
An attacker can exploit CVE-2023-4410 by remotely initiating the attack through the function setDiagnosisCfg.
At the moment, there are no known fixes for CVE-2023-4410. It is recommended to follow the vendor's security advisories for updates.