TOTOLINX EX1800T v9.1.0cu.2112_B20220316 is vulnerable to arbitrary command execution in the ‘enable parameter’ of the setDmzCfg interface of the cstecgi .cgi
                
            References
                    | Link | Resource | 
|---|---|
| https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setDmzCfg/ | Exploit Third Party Advisory | 
| https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setDmzCfg/ | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 08:37
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setDmzCfg/ - Exploit, Third Party Advisory | 
27 Aug 2024, 20:35
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-94 | 
27 Dec 2023, 21:10
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:o:totolink:ex1800t_firmware:9.1.0cu.2112_b20220316:*:*:*:*:*:*:* cpe:2.3:h:totolink:ex1800t:-:*:*:*:*:*:*:* | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.8 | 
| CWE | NVD-CWE-noinfo | |
| References | () https://815yang.github.io/2023/12/11/EX1800T/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setDmzCfg/ - Exploit, Third Party Advisory | 
22 Dec 2023, 20:32
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-12-22 19:15
Updated : 2024-11-21 08:37
NVD link : CVE-2023-51015
Mitre link : CVE-2023-51015
CVE.ORG link : CVE-2023-51015
JSON object : View
Products Affected
                totolink
- ex1800t_firmware
- ex1800t
CWE
                