In TOTOLINK X6000R_Firmware V9.4.0cu.852_B20230719, the shttpd file sub_417338 function obtains fields from the front-end, connects them through the snprintf function, and passes them to the CsteSystem function, resulting in a command execution vulnerability.
References
Link | Resource |
---|---|
https://palm-jump-676.notion.site/CVE-2023-48800-ad96548d06c645738daf3ab77575fd74 | Exploit Third Party Advisory |
https://www.notion.so/X6000R-sub_417338-ad96548d06c645738daf3ab77575fd74?pvs=4 | Exploit Third Party Advisory |
https://palm-jump-676.notion.site/CVE-2023-48800-ad96548d06c645738daf3ab77575fd74 | Exploit Third Party Advisory |
https://www.notion.so/X6000R-sub_417338-ad96548d06c645738daf3ab77575fd74?pvs=4 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://palm-jump-676.notion.site/CVE-2023-48800-ad96548d06c645738daf3ab77575fd74 - Exploit, Third Party Advisory | |
References | () https://www.notion.so/X6000R-sub_417338-ad96548d06c645738daf3ab77575fd74?pvs=4 - Exploit, Third Party Advisory |
07 Dec 2023, 20:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.852_b20230719:*:*:*:*:*:*:* cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:* |
|
First Time |
Totolink x6000r Firmware
Totolink Totolink x6000r |
|
CWE | CWE-78 | |
References | () https://palm-jump-676.notion.site/CVE-2023-48800-ad96548d06c645738daf3ab77575fd74 - Exploit, Third Party Advisory | |
References | () https://www.notion.so/X6000R-sub_417338-ad96548d06c645738daf3ab77575fd74?pvs=4 - Exploit, Third Party Advisory |
04 Dec 2023, 13:48
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-04 13:15
Updated : 2024-11-21 08:32
NVD link : CVE-2023-48800
Mitre link : CVE-2023-48800
CVE.ORG link : CVE-2023-48800
JSON object : View
Products Affected
totolink
- x6000r
- x6000r_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')