First published: Thu Nov 30 2023(Updated: )
In TOTOLINK X6000R V9.4.0cu.852_B20230719, the shttpd file, sub_4119A0 function obtains fields from the front-end through Uci_ Set_ The Str function that when passed to the CsteSystem function creates a command execution vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink X6000r Firmware | =9.4.0cu.852_b20230719 | |
TOTOlink X6000R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48811 is a command execution vulnerability in TOTOLINK X6000R V9.4.0cu.852_B20230719.
The severity of CVE-2023-48811 is critical with a CVSS score of 9.8.
CVE-2023-48811 allows an attacker to execute commands on the affected TOTOLINK X6000R V9.4.0cu.852_B20230719 device.
To fix CVE-2023-48811, it is recommended to update the TOTOLINK X6000R firmware to a version that addresses the vulnerability.
You can find more information about CVE-2023-48811 at the following reference: [link](https://www.notion.so/X6000R-sub_4119A0-8-2332305e3d8044c09f093404a8ae59f4?pvs=4)