First published: Wed Dec 06 2023(Updated: )
TOTOLINK A3002RU version 2.0.0-B20190902.1958 has a post-authentication RCE due to incorrect access control, allows attackers to bypass front-end security restrictions and execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
TOTOLINK A3002RU | =2.0.0-b20190902.1958 | |
TOTOLINK A3002RU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48859 has a high severity due to its potential for remote code execution.
To fix CVE-2023-48859, update the TOTOLINK A3002RU firmware to a version that mitigates this vulnerability.
CVE-2023-48859 is a remote code execution vulnerability resulting from improper access control.
CVE-2023-48859 affects users of TOTOLINK A3002RU running firmware version 2.0.0-B20190902.1958.
Yes, CVE-2023-48859 can be exploited remotely after authentication due to inadequate security measures.