Totolink

N150rt Firmware

20 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.23%
  • Veröffentlicht 27.04.2025 23:00:09
  • Zuletzt bearbeitet 12.05.2025 19:31:29

A vulnerability, which was classified as critical, has been found in TOTOLINK N150RT 3.4.0-B20190525. Affected by this issue is some unknown functionality of the file /boafrm/formVlan. The manipulation of the argument submit-url leads to buffer overf...

Exploit
  • EPSS 0.23%
  • Veröffentlicht 27.04.2025 22:31:06
  • Zuletzt bearbeitet 12.05.2025 19:31:35

A vulnerability classified as critical was found in TOTOLINK N150RT 3.4.0-B20190525. Affected by this vulnerability is an unknown functionality of the file /boafrm/formStaticDHCP. The manipulation of the argument Hostname leads to buffer overflow. Th...

Exploit
  • EPSS 0.22%
  • Veröffentlicht 27.04.2025 22:00:07
  • Zuletzt bearbeitet 07.05.2025 18:29:25

A vulnerability classified as critical has been found in TOTOLINK N150RT 3.4.0-B20190525. Affected is an unknown function of the file /boafrm/formPortFw. The manipulation of the argument service_type leads to buffer overflow. It is possible to launch...

Exploit
  • EPSS 1.39%
  • Veröffentlicht 27.04.2025 21:31:06
  • Zuletzt bearbeitet 07.05.2025 18:36:05

A vulnerability was found in TOTOLINK N150RT 3.4.0-B20190525. It has been rated as critical. This issue affects some unknown processing of the file /boafrm/formWsc. The manipulation of the argument localPin leads to command injection. The attack may ...

  • EPSS 63.24%
  • Veröffentlicht 27.11.2024 17:15:12
  • Zuletzt bearbeitet 29.11.2024 20:15:20

An issue in TOTOLINK-CX-A3002RU V1.0.4-B20171106.1512 and TOTOLINK-CX-N150RT V2.1.6-B20171121.1002 and TOTOLINK-CX-N300RT V2.1.6-B20170724.1420 and TOTOLINK-CX-N300RT V2.1.8-B20171113.1408 and TOTOLINK-CX-N300RT V2.1.8-B20191010.1107 and TOTOLINK-CX-...

Exploit
  • EPSS 21.81%
  • Veröffentlicht 09.12.2020 21:15:15
  • Zuletzt bearbeitet 21.11.2024 05:18:04

TOTOLINK A3002RU-V2.0.0 B20190814.1034 allows authenticated remote users to modify the system's 'Run Command'. An attacker can use this functionality to execute arbitrary OS commands on the router.

Exploit
  • EPSS 93.67%
  • Veröffentlicht 27.01.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:28

On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the dev...

Exploit
  • EPSS 1.36%
  • Veröffentlicht 27.01.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:28

A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) stores cleartext administrative passwords in flash memory and in a file. This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT throug...

Exploit
  • EPSS 2.79%
  • Veröffentlicht 27.01.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:27

A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) allows remote attackers to retrieve the configuration, including sensitive data (usernames and passwords). This affects TOTOLINK A3002RU through 2.0.0, ...

Exploit
  • EPSS 0.62%
  • Veröffentlicht 27.01.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:28

On certain TOTOLINK Realtek SDK based routers, the CAPTCHA text can be retrieved via an {"topicurl":"setting/getSanvas"} POST to the boafrm/formLogin URI, leading to a CAPTCHA bypass. (Also, the CAPTCHA text is not needed once the attacker has determ...