TOTOlink EX1800T V9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘apcliAuthMode’ parameter of the setWiFiExtenderConfig interface of the cstecgi .cgi.
References
Link | Resource |
---|---|
https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-apcliAuthMode/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
27 Dec 2023, 21:10
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:totolink:ex1800t_firmware:9.1.0cu.2112_b20220316:*:*:*:*:*:*:* cpe:2.3:h:totolink:ex1800t:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://815yang.github.io/2023/12/11/EX1800T/2/3/TOTOlinkEX1800T_V9.1.0cu.2112_B20220316setWiFiExtenderConfig-apcliAuthMode/ - Exploit, Third Party Advisory |
22 Dec 2023, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-22 18:15
Updated : 2024-02-05 00:22
NVD link : CVE-2023-51027
Mitre link : CVE-2023-51027
CVE.ORG link : CVE-2023-51027
JSON object : View
Products Affected
totolink
- ex1800t
- ex1800t_firmware
CWE