TOTOlink EX1800T V9.1.0cu.2112_B20220316 was discovered to contain a remote command execution (RCE) vulnerability via the telnet_enabled parameter of the setTelnetCfg interface
References
| Link | Resource |
|---|---|
| https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setTelnetCfg/ | Exploit Third Party Advisory |
| https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setTelnetCfg/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 08:39
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://815yang.github.io/2023/12/11/EX1800T/2/TOTOlinkEX1800T_V9.1.0cu.2112_B2022031setTelnetCfg/ - Exploit, Third Party Advisory |
25 Oct 2024, 21:35
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-78 |
18 Jan 2024, 20:20
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-01-12 13:15
Updated : 2025-06-11 17:15
NVD link : CVE-2023-52026
Mitre link : CVE-2023-52026
CVE.ORG link : CVE-2023-52026
JSON object : View
Products Affected
totolink
- ex1800t_firmware
- ex1800t
CWE
NVD-CWE-noinfo
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
