First published: Mon Jun 03 2024(Updated: )
TOTOLINK LR350 V9.3.5u.6369_B20220309 was discovered to contain a command injection via the host_time parameter in the NTPSyncWithHost function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink LR350 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36783 has been classified as a critical vulnerability due to the potential for command injection.
To fix CVE-2024-36783, it is recommended to update the firmware of the TOTOLINK LR350 to the latest version that addresses this vulnerability.
CVE-2024-36783 specifically affects the TOTOLINK LR350 running firmware version V9.3.5u.6369_B20220309.
If exploited, CVE-2024-36783 could allow an attacker to execute arbitrary commands on the TOTOLINK LR350, compromising device security.
Yes, there are reports indicating that CVE-2024-36783 can be exploited through the host_time parameter in the NTPSyncWithHost function.