Totolink

A3300r Firmware

27 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.14%
  • Published 31.10.2023 15:15:09
  • Last modified 21.11.2024 08:29:36

TOTOLINK A3300R V17.0.0cu.557_B20221024 is vulnerable to Incorrect Access Control. Attackers are able to reset serveral critical passwords without authentication by visiting specific pages.

Exploit
  • EPSS 2.99%
  • Published 31.10.2023 14:15:11
  • Last modified 21.11.2024 08:29:34

TOTOLINK A3300R 17.0.0cu.557_B20221024 contains a command injection via the file_name parameter in the UploadFirmwareFile function.

Exploit
  • EPSS 1.58%
  • Published 07.07.2023 20:15:10
  • Last modified 21.11.2024 08:11:08

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the command parameter in the setTracerouteCfg function.

Exploit
  • EPSS 1.45%
  • Published 07.07.2023 20:15:10
  • Last modified 21.11.2024 08:11:07

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the ip parameter in the setDiagnosisCfg function.

Exploit
  • EPSS 1.45%
  • Published 07.07.2023 20:15:10
  • Last modified 21.11.2024 08:11:07

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the admuser parameter in the setPasswordCfg function.

Exploit
  • EPSS 3.25%
  • Published 07.07.2023 20:15:10
  • Last modified 21.11.2024 08:11:07

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain an unauthenticated remote code execution (RCE) vulnerability via the lang parameter in the setLanguageCfg function.

  • EPSS 0.76%
  • Published 18.05.2023 02:15:12
  • Last modified 22.01.2025 15:15:09

TOTOLINK A3300R v17.0.0cu.557 is vulnerable to Command Injection via /cgi-bin/cstecgi.cgi.