6 results (0.008 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

TOTOlink EX1200L V9.3.5u.6146_B20201023 is vulnerable to arbitrary command execution via the cstecgi.cgi setOpModeCfg interface. TOTOlink EX1200L V9.3.5u.6146_B20201023 es vulnerable a la ejecución de comandos arbitrarios a través de la interfaz cstecgi.cgi setOpModeCfg. • https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_setOpModeCfg • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 1

TOTOlink EX1200L V9.3.5u.6146_B20201023 is vulnerable to arbitrary command execution via the cstecgi.cgi UploadFirmwareFile interface. TOTOlink EX1200L V9.3.5u.6146_B20201023 es vulnerable a la ejecución de comandos arbitrarios a través de la interfaz cstecgi.cgi UploadFirmwareFile. • https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_UploadFirmwareFile • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

TOTOLINK EX1200L V9.3.5u.6146_B20201023 is vulnerable to arbitrary command execution on the cstecgi.cgi NTPSyncWithHost interface. TOTOLINK EX1200L V9.3.5u.6146_B20201023 es vulnerable a la ejecución de comandos arbitrarios en la interfaz cstecgi.cgi NTPSyncWithHost. • https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_NTPSyncWithHost • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 and classified as critical. This issue affects the function setWanCfg. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 https://vuldb.com/?ctiid.237515 https://vuldb.com/?id.237515 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability has been found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 and classified as critical. This vulnerability affects the function setTracerouteCfg. The manipulation leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 https://vuldb.com/?ctiid.237514 https://vuldb.com/?id.237514 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •