Lucene search

K
prionPRIOn knowledge basePRION:CVE-2023-6612
HistoryDec 08, 2023 - 4:15 p.m.

Command injection

2023-12-0816:15:00
PRIOn knowledge base
www.prio-n.com
4
vulnerability
totolink x5000r
command injection
public disclosure
nvd
critical rating
vendor non-responsive
web cgi vulnerability

7.6 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

32.0%

A vulnerability was found in Totolink X5000R 9.1.0cu.2300_B20230112. It has been rated as critical. This issue affects the function setDdnsCfg/setDynamicRoute/setFirewallType/setIPSecCfg/setIpPortFilterRules/setLancfg/setLoginPasswordCfg/setMacFilterRules/setMtknatCfg/setNetworkConfig/setPortForwardRules/setRemoteCfg/setSSServer/setScheduleCfg/setSmartQosCfg/setStaticDhcpRules/setStaticRoute/setVpnAccountCfg/setVpnPassCfg/setVpnUser/setWiFiAclAddConfig/setWiFiEasyGuestCfg/setWiFiGuestCfg/setWiFiRepeaterConfig/setWiFiScheduleCfg/setWizardCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to os command injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247247. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

7.6 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

32.0%

Related for PRION:CVE-2023-6612