First published: Fri Nov 22 2024(Updated: )
In TOTOLINK X6000R V9.4.0cu.1041_B20240224 in the shttpd file, the Uci_Set Str function is used without strict parameter filtering. An attacker can achieve arbitrary command execution by constructing the payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink X6000R AX3000 | =9.4.0cu.1041_b20240224 | |
Totolink X6000R AX3000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-52723 has a high severity due to the potential for arbitrary command execution.
To fix CVE-2024-52723, update the firmware of the TOTOLINK X6000R to the latest version provided by the vendor.
CVE-2024-52723 affects the TOTOLINK X6000R firmware version 9.4.0cu.1041_B20240224.
CVE-2024-52723 is a remote command execution vulnerability due to improper parameter filtering.
Users of the TOTOLINK X6000R router running the specified affected firmware are at risk from CVE-2024-52723.