Page 3 of 17 results (0.001 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

System command injection in formDlna in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "sambaUser" POST parameter. La inyección de comandos del sistema en formDlna, en la versión 1.0.8 de TOTOLINK A3002RU, permite a los atacantes ejecutar comandos del sistema en el parámetro "sambaUser" POST. • https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 0

Cross-site scripting in password.htm in TOTOLINK A3002RU version 1.0.8 allows attackers to execute arbitrary JavaScript via the user's username. Cross-Site Scripting (XSS) en password.htm, en la versión 1.0.8 de TOTOLINK A3002RU, permite a los atacantes ejecutar código arbitrario de JavaScript mediante el nombre de usuario del usuario. • https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 1%CPEs: 2EXPL: 1

Incorrect access control in formPasswordSetup in TOTOLINK A3002RU version 1.0.8 allows attackers to change the admin user's password via an unauthenticated POST request. El control de acceso incorrecto en formPasswordSetup, en la versión 1.0.8 de TOTOLINK A3002RU, permite a los atacantes cambiar la contraseña del usuario de administrador mediante una petición POST no autenticada. • https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 • CWE-20: Improper Input Validation •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

Password disclosure in password.htm in TOTOLINK A3002RU version 1.0.8 allows attackers to obtain the plaintext password for the admin user by making a GET request for password.htm. La divulgación de contraseñas en password.htm, en la versión 1.0.8 de TOTOLINK A3002RU, permite a los atacantes obtener la contraseña del usuario de administrador en texto plano, realizando una petición GET para password.htm. • https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

Cross-site scripting in notice_gen.htm in TOTOLINK A3002RU version 1.0.8 allows attackers to execute arbitrary JavaScript by modifying the "Input your notice URL" field. Cross-Site Scripting (XSS), en notice_gen.htm en la versión 1.0.8 de TOTOLINK A3002RU, permite a los atacantes remotos ejecutar código arbitrario de JavaScript, modificando el campo "Input your notice URL" . • https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •