Filtered by vendor Totolink
Subscribe
Total
545 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-45736 | 1 Totolink | 2 X5000r, X5000r Firmware | 2024-02-04 | 7.8 HIGH | 7.5 HIGH |
TOTOLINK X5000R v9.1.0u.6118_B20201102 was discovered to contain a stack overflow in the function setL2tpServerCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via the eip, sip, server parameters. | |||||
CVE-2021-45735 | 1 Totolink | 2 X5000r, X5000r Firmware | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
TOTOLINK X5000R v9.1.0u.6118_B20201102 was discovered to use the HTTP protocol for authentication into the admin interface, allowing attackers to intercept user credentials via packet capture software. | |||||
CVE-2021-45741 | 1 Totolink | 2 X5000r, X5000r Firmware | 2024-02-04 | 7.8 HIGH | 7.5 HIGH |
TOTOLINK X5000R v9.1.0u.6118_B20201102 was discovered to contain a stack overflow in the function setIpv6Cfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via the relay6to4 parameters. | |||||
CVE-2021-45742 | 1 Totolink | 2 A720r, A720r Firmware | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
TOTOLINK A720R v4.1.5cu.470_B20200911 was discovered to contain a command injection vulnerability in the "Main" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter. | |||||
CVE-2021-45740 | 1 Totolink | 2 A720r, A720r Firmware | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
TOTOLINK A720R v4.1.5cu.470_B20200911 was discovered to contain a stack overflow in the setWiFiWpsStart function. This vulnerability allows attackers to cause a Denial of Service (DoS) via the pin parameter. | |||||
CVE-2021-34223 | 1 Totolink | 2 A3002r, A3002r Firmware | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting in urlfilter.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "URL Address" field. | |||||
CVE-2021-27708 | 1 Totolink | 4 A720r, A720r Firmware, X5000r and 1 more | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system function with untrusted input. In the function, "command" parameter is directly passed to the attacker, allowing them to control the "command" field to attack the OS. | |||||
CVE-2021-34207 | 1 Totolink | 2 A3002r, A3002r Firmware | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting in ddns.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Domain Name" field, "Server Address" field, "User Name/Email", or "Password/Key" field. | |||||
CVE-2021-34218 | 1 Totolink | 2 A3002r, A3002r Firmware | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
Directory Indexing in Login Portal of Login Portal of TOTOLINK-A702R-V1.0.0-B20161227.1023 allows attacker to access /add/ , /img/, /js/, and /mobile directories via GET Parameter. | |||||
CVE-2021-34215 | 1 Totolink | 2 A3002r, A3002r Firmware | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting in tcpipwan.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Service Name" field. | |||||
CVE-2021-34220 | 1 Totolink | 2 A3002r, A3002r Firmware | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting in tr069config.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "User Name" field or "Password" field. | |||||
CVE-2021-35325 | 1 Totolink | 2 A720r, A720r Firmware | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
A stack overflow in the checkLoginUser function of TOTOLINK A720R A720R_Firmware v4.1.5cu.470_B20200911 allows attackers to cause a denial of service (DOS). | |||||
CVE-2021-27710 | 1 Totolink | 4 A720r, A720r Firmware, X5000r and 1 more | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system function with untrusted input. In the function, "ip" parameter is directly passed to the attacker, allowing them to control the "ip" field to attack the OS. | |||||
CVE-2021-35324 | 1 Totolink | 2 A720r, A720r Firmware | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
A vulnerability in the Form_Login function of TOTOLINK A720R A720R_Firmware V4.1.5cu.470_B20200911 allows attackers to bypass authentication. | |||||
CVE-2021-34228 | 1 Totolink | 2 A3002r, A3002r Firmware | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting in parent_control.htm in TOTOLINK A3002R version V1.1.1-B20200824 (Important Update, new UI) allows attackers to execute arbitrary JavaScript by modifying the "Description" field and "Service Name" field. | |||||
CVE-2021-35327 | 1 Totolink | 2 A720r, A720r Firmware | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
A vulnerability in TOTOLINK A720R A720R_Firmware v4.1.5cu.470_B20200911 allows attackers to start the Telnet service, then login with the default credentials via a crafted POST request. | |||||
CVE-2021-35326 | 1 Totolink | 2 A720r, A720r Firmware | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
A vulnerability in TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows attackers to download the configuration file via sending a crafted HTTP request. | |||||
CVE-2020-27368 | 1 Totolink | 2 A702r, A702r Firmware | 2024-02-04 | 2.1 LOW | 5.5 MEDIUM |
Directory Indexing in Login Portal of Login Portal of TOTOLINK-A702R-V1.0.0-B20161227.1023 allows attacker to access /icons/ directories via GET Parameter. | |||||
CVE-2015-9551 | 1 Totolink | 16 A850r-v1, A850r-v1 Firmware, F1-v2 and 13 more | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
An issue was discovered on TOTOLINK A850R-V1 through 1.0.1-B20150707.1612 and F1-V2 through 1.1-B20150708.1646 devices. There is Remote Code Execution in the management interface via the formSysCmd sysCmd parameter. | |||||
CVE-2015-9550 | 1 Totolink | 16 A850r-v1, A850r-v1 Firmware, F1-v2 and 13 more | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered on TOTOLINK A850R-V1 through 1.0.1-B20150707.1612 and F1-V2 through 1.1-B20150708.1646 devices. By sending a specific hel,xasf packet to the WAN interface, it is possible to open the web management interface on the WAN interface. |