CVE-2024-0299 – Totolink N200RE cstecgi.cgi setTracerouteCfg os command injection
https://notcve.org/view.php?id=CVE-2024-0299
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been declared as critical. Affected by this vulnerability is the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to os command injection. The attack can be launched remotely. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/N200RE/setTracerouteCfg/README.md https://vuldb.com/?ctiid.249865 https://vuldb.com/?id.249865 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2024-0298 – Totolink N200RE cstecgi.cgi setDiagnosisCfg os command injection
https://notcve.org/view.php?id=CVE-2024-0298
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been classified as critical. Affected is the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to os command injection. It is possible to launch the attack remotely. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/N200RE/setDiagnosisCfg/README.md https://vuldb.com/?ctiid.249864 https://vuldb.com/?id.249864 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2024-0297 – Totolink N200RE cstecgi.cgi UploadFirmwareFile os command injection
https://notcve.org/view.php?id=CVE-2024-0297
A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216 and classified as critical. This issue affects the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/N200RE/UploadFirmwareFile/README.md https://vuldb.com/?ctiid.249863 https://vuldb.com/?id.249863 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2024-0296 – Totolink N200RE cstecgi.cgi NTPSyncWithHost os command injection
https://notcve.org/view.php?id=CVE-2024-0296
A vulnerability has been found in Totolink N200RE 9.3.5u.6139_B20201216 and classified as critical. This vulnerability affects the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument host_time leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/N200RE/NTPSyncWithHost/README.md https://vuldb.com/?ctiid.249862 https://vuldb.com/?id.249862 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2023-4746 – TOTOLINK N200RE V5 Validity_check format string
https://notcve.org/view.php?id=CVE-2023-4746
A vulnerability classified as critical has been found in TOTOLINK N200RE V5 9.3.5u.6437_B20230519. This affects the function Validity_check. The manipulation leads to format string. It is possible to initiate the attack remotely. The root-cause of the vulnerability is a format string issue. • https://gist.github.com/dmknght/8f3b6aa65e9d08f45b5236c6e9ab8d80 https://vuldb.com/?ctiid.238635 https://vuldb.com/?id.238635 • CWE-134: Use of Externally-Controlled Format String •