Vulnerabilities (CVE)

Filtered by vendor Totolink Subscribe
Filtered by product Ac1200 T8
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-8078 1 Totolink 2 Ac1200 T8, T8 Firmware 2024-08-29 9.0 HIGH 9.8 CRITICAL
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been declared as critical. This vulnerability affects the function setTracerouteCfg. The manipulation leads to buffer overflow. The attack can be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-8079 1 Totolink 2 Ac1200 T8, T8 Firmware 2024-08-29 9.0 HIGH 9.8 CRITICAL
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been rated as critical. This issue affects the function exportOvpn. The manipulation leads to buffer overflow. The attack may be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-8077 1 Totolink 2 Ac1200 T8, T8 Firmware 2024-08-29 6.5 MEDIUM 9.8 CRITICAL
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been classified as critical. This affects the function setTracerouteCfg. The manipulation leads to os command injection. It is possible to initiate the attack remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-8076 1 Totolink 2 Ac1200 T8, T8 Firmware 2024-08-29 9.0 HIGH 9.8 CRITICAL
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 and classified as critical. Affected by this issue is the function setDiagnosisCfg. The manipulation leads to buffer overflow. The attack may be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-8075 1 Totolink 2 Ac1200 T8, T8 Firmware 2024-08-29 6.5 MEDIUM 9.8 CRITICAL
A vulnerability has been found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228 and classified as critical. Affected by this vulnerability is the function setDiagnosisCfg. The manipulation leads to os command injection. The attack can be launched remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.