{"id": "CVE-2015-9550", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2020-11-24T21:15:11.353", "references": [{"url": "https://pierrekim.github.io/blog/2015-07-16-backdoor-and-RCE-found-in-8-TOTOLINK-products.html", "tags": ["Exploit", "Third Party Advisory"], "source": "cve@mitre.org"}, {"url": "https://pierrekim.github.io/blog/2015-07-16-backdoor-and-RCE-found-in-8-TOTOLINK-products.html", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-668"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered on TOTOLINK A850R-V1 through 1.0.1-B20150707.1612 and F1-V2 through 1.1-B20150708.1646 devices. By sending a specific hel,xasf packet to the WAN interface, it is possible to open the web management interface on the WAN interface."}, {"lang": "es", "value": "Se detect\u00f3 un problema en los dispositivos TOTOLINK A850R-V1 versiones hasta 1.0.1-B20150707.1612 y F1-V2 versiones hasta 1.1-B20150708.1646. Mediante el env\u00edo de un paquete hel,xasf espec\u00edfico hacia la interfaz WAN, es posible abrir la interfaz de administraci\u00f3n web sobre la interfaz WAN"}], "lastModified": "2024-11-21T02:40:54.460", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:totolink:a850r-v1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29DDFAFC-3538-45B5-AB36-3895F16BD764", "versionEndExcluding": "1.0.1-b20150707.1612"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:totolink:a850r-v1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "74953383-D90B-4B54-B02B-617BCF8010E9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:totolink:f1-v2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBC80064-797F-487C-99C1-D8F4981D4990", "versionEndExcluding": "2.1.1-b20150708.1646"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:totolink:f1-v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "611785C4-C11E-4F73-BB8B-DFEE66F3FB6A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:totolink:f2-v1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6844CA14-C66E-4E6B-ABC6-1D083EEF9D82", "versionEndExcluding": "2.1.0-b20150320.1611"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:totolink:f2-v1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B693CF6C-A0C7-42DD-AA82-36887087BCED"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:totolink:n150rt-v2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "572842ED-48C4-4D90-B107-EF6DBFC19585", "versionEndExcluding": "2.1.1-b20150708.1548"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:totolink:n150rt-v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0251C2F8-9BCC-4B34-8747-09CA39E6CE7C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:totolink:n151rt-v2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7E9FE34-8EBD-47BD-AD90-F07381E0C06A", "versionEndExcluding": "1.1-b20150708.1559"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:totolink:n151rt-v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "00922E42-2177-4214-8A1E-8FEB6BDE2869"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:totolink:n300rh-v2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D436BD3-1C39-49CE-BC15-50C890F58931", "versionEndExcluding": "2.0.1-b20150708.1625"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:totolink:n300rh-v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B0ECED9E-930D-4061-ABB4-CC2DD2346BBC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:totolink:n300rh-v3_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BC6C344-01DD-4EB6-B1A3-60B782E81BA4", "versionEndExcluding": "3.0.0-b20150331.0858"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:totolink:n300rh-v3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "058F675A-3C67-4B73-808C-8C65D7D65C12"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:totolink:n300rt-v2_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74971352-B072-4A9A-B07E-4E92F35C716A", "versionEndExcluding": "2.1.1-b20150708.1613"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:totolink:n300rt-v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4637323A-10A8-4841-BC49-3EF2894C5F86"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}