First published: Mon Oct 16 2023(Updated: )
TOTOLINK X5000R V9.1.0u.6118_B20201102 and TOTOLINK A7000R V9.1.0u.6115_B20201022 were discovered to contain a stack overflow in the function setParentalRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TOTOLINK X5000R firmware | =9.1.0u.6118_b20201102 | |
TOTOLINK X5000R firmware | ||
TOTOLINK A7000R firmware | =9.1.0u.6115_b20201022 | |
TOTOLINK A7000R firmware | ||
All of | ||
TOTOLINK X5000R firmware | =9.1.0u.6118_b20201102 | |
TOTOLINK X5000R firmware | ||
All of | ||
TOTOLINK A7000R firmware | =9.1.0u.6115_b20201022 | |
TOTOLINK A7000R firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this TOTOLINK issue is CVE-2023-45985.
CVE-2023-45985 has a severity rating of 7.5 (High).
CVE-2023-45985 affects TOTOLINK X5000R firmware version 9.1.0u.6118_b20201102 by allowing attackers to cause a Denial of Service (DoS) via a crafted POST request.
CVE-2023-45985 affects TOTOLINK A7000R firmware version 9.1.0u.6115_b20201022 by allowing attackers to cause a Denial of Service (DoS) via a crafted POST request.
No, TOTOLINK X5000R hardware is not vulnerable to CVE-2023-45985.
No, TOTOLINK A7000R hardware is not vulnerable to CVE-2023-45985.
To fix CVE-2023-45985, it is recommended to update the firmware to a non-vulnerable version provided by TOTOLINK.