First published: Fri Dec 08 2023(Updated: )
A vulnerability was found in Totolink X5000R 9.1.0cu.2300_B20230112. It has been rated as critical. This issue affects the function setDdnsCfg/setDynamicRoute/setFirewallType/setIPSecCfg/setIpPortFilterRules/setLancfg/setLoginPasswordCfg/setMacFilterRules/setMtknatCfg/setNetworkConfig/setPortForwardRules/setRemoteCfg/setSSServer/setScheduleCfg/setSmartQosCfg/setStaticDhcpRules/setStaticRoute/setVpnAccountCfg/setVpnPassCfg/setVpnUser/setWiFiAclAddConfig/setWiFiEasyGuestCfg/setWiFiGuestCfg/setWiFiRepeaterConfig/setWiFiScheduleCfg/setWizardCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to os command injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247247. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
TOTOLINK X5000R firmware | =9.1.0cu.2300_b20230112 | |
TOTOLINK X5000R firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6612 has been rated as critical, indicating a significant risk to affected systems.
To mitigate CVE-2023-6612, update the Totolink X5000R firmware to the latest version provided by the manufacturer.
CVE-2023-6612 specifically affects Totolink X5000R firmware version 9.1.0cu.2300_B20230112.
CVE-2023-6612 affects functions related to DDNS configuration, dynamic routing, firewall settings, IPSec configuration, and more.
While the best solution is to update, temporarily restricting access to the affected functions may help alleviate some risk.