First published: Sun Sep 15 2024(Updated: )
A vulnerability classified as critical has been found in TOTOLINK A720R 4.1.5. Affected is the function exportOvpn. The manipulation leads to os command injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
TOTOLINK A720R firmware | =4.1.5 | |
TOTOLINK A720R firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8869 is classified as critical due to its potential for os command injection.
To fix CVE-2024-8869, upgrade the TOTOLINK A720R firmware to a version later than 4.1.5.
CVE-2024-8869 affects the exportOvpn function in the TOTOLINK A720R firmware.
Yes, CVE-2024-8869 can be exploited remotely, allowing attackers to perform os command injection.
The complexity of an attack for CVE-2024-8869 is considered to be rather high.