4 results (0.005 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 1

16 Oct 2023 — TOTOLINK CP300+ V5.2cu.7594_B20200910 was discovered to contain a stack overflow via the pingIp parameter in the function setDiagnosisCfg. Se descubrió que TOTOLINK CP300+ V5.2cu.7594_B20200910 contenía un desbordamiento de pila a través del parámetro pingIp en la función setDiagnosisCfg. • https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/CP300%2B_1.md • CWE-787: Out-of-bounds Write •

CVSS: 10.0EPSS: 51%CPEs: 2EXPL: 1

16 Oct 2023 — TOTOLINK CP300+ V5.2cu.7594_B20200910 and before is vulnerable to command injection. TOTOLINK CP300+ V5.2cu.7594_B20200910 y anteriores son vulnerables a la inyección de comandos. • https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/CP300%2B_2.md • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 10.0EPSS: 51%CPEs: 2EXPL: 1

16 Oct 2023 — TOTOLINK CP300+ V5.2cu.7594_B20200910 and before is vulnerable to command injection. TOTOLINK CP300+ V5.2cu.7594_B20200910 y anteriores son vulnerables a la inyección de comandos. • https://github.com/Archerber/bug_submit/blob/main/TOTOLINK/CP300%2B_3.md • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 10.0EPSS: 2%CPEs: 2EXPL: 1

16 May 2023 — A command injection vulnerability in the hostTime parameter in the function NTPSyncWithHostof TOTOLINK CP300+ V5.2cu.7594_B20200910 allows attackers to execute arbitrary commands via a crafted http packet. • https://github.com/xiangbulala/CVE/blob/main/totlink.md • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •