Command Injection Vulnerability in TOTOLINK CA300-PoE Router
CVE-2023-24159
9.8CRITICAL
Summary
The TOTOLINK CA300-PoE V6.2c.884 is susceptible to a command injection vulnerability due to improper handling of the admpass parameter in the setPasswordCfg function. This flaw can be exploited by attackers to execute arbitrary commands on the device, potentially compromising its integrity and security. System administrators should apply the necessary patches and review configurations to mitigate this risk.
References
EPSS Score
31% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved