TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the command parameter in the setTracerouteCfg function.
References
Link | Resource |
---|---|
https://sore-pail-31b.notion.site/Command-Injection-4-ea4969f635f54fe5b2f575e93443a4e0 | Exploit Third Party Advisory |
https://sore-pail-31b.notion.site/Command-Injection-4-ea4969f635f54fe5b2f575e93443a4e0 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://sore-pail-31b.notion.site/Command-Injection-4-ea4969f635f54fe5b2f575e93443a4e0 - Exploit, Third Party Advisory |
Information
Published : 2023-04-14 14:15
Updated : 2024-11-21 07:57
NVD link : CVE-2023-29798
Mitre link : CVE-2023-29798
CVE.ORG link : CVE-2023-29798
JSON object : View
Products Affected
totolink
- x18_firmware
- x18
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')