First published: Tue May 28 2024(Updated: )
TOTOLINK CP900L v4.1.5cu.798_B20221228 weas discovered to contain a command injection vulnerability in the NTPSyncWithHost function via the hostTime parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink CP900L Firmware | ||
All of | ||
Totolink CP900L Firmware | =4.1.5cu.798_b20221228 | |
Totolink CP900L Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35397 is classified as a high severity vulnerability due to the potential for remote command execution.
To fix CVE-2024-35397, you should update the TOTOLINK CP900L firmware to a patched version that addresses the command injection vulnerability.
CVE-2024-35397 is a command injection vulnerability found in the NTPSyncWithHost function of the TOTOLINK CP900L.
CVE-2024-35397 affects the TOTOLINK CP900L firmware version 4.1.5cu.798_B20221228.
Yes, CVE-2024-35397 can be exploited remotely if an attacker sends a crafted request to the vulnerable NTPSyncWithHost function.