Command Injection Vulnerability in TOTOLINK CA300-PoE Device
CVE-2023-24138
9.8CRITICAL
Summary
The TOTOLINK CA300-PoE device version V6.2c.884 has been identified to have a command injection vulnerability. This issue arises from an improper validation of user input in the NTPSyncWithHost function, particularly in the host_time parameter. Exploiting this vulnerability can allow an attacker to execute arbitrary commands on the affected device, potentially compromising network integrity and security.
References
EPSS Score
31% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved