Totolink

N200re Firmware

19 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.07%
  • Veröffentlicht 08.01.2024 05:15:09
  • Zuletzt bearbeitet 21.11.2024 08:46:15

A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. It has been classified as critical. Affected is the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to os command injection. It i...

Exploit
  • EPSS 0.9%
  • Veröffentlicht 08.01.2024 05:15:09
  • Zuletzt bearbeitet 21.11.2024 08:46:15

A vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216 and classified as critical. This issue affects the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to os command injectio...

Exploit
  • EPSS 1.54%
  • Veröffentlicht 08.01.2024 04:15:08
  • Zuletzt bearbeitet 21.11.2024 08:46:15

A vulnerability has been found in Totolink N200RE 9.3.5u.6139_B20201216 and classified as critical. This vulnerability affects the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument host_time leads to os comma...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 18.05.2023 13:15:09
  • Zuletzt bearbeitet 21.11.2024 07:59:17

A vulnerability classified as problematic has been found in TOTOLINK N200RE 9.3.5u.6255_B20211224. Affected is an unknown function of the file /squashfs-root/etc_ro/custom.conf of the component Telnet Service. The manipulation leads to password in co...

  • EPSS 0.2%
  • Veröffentlicht 02.05.2022 23:15:07
  • Zuletzt bearbeitet 21.11.2024 05:13:56

A cross site scripting (XSS) vulnerability in the error page of Totolink N200RE and N100RE Routers 2.0 allows attackers to execute arbitrary web scripts or HTML via SCRIPT element.

Exploit
  • EPSS 93.67%
  • Veröffentlicht 27.01.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:28

On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the dev...

Exploit
  • EPSS 1.36%
  • Veröffentlicht 27.01.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:28

A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) stores cleartext administrative passwords in flash memory and in a file. This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT throug...

Exploit
  • EPSS 2.79%
  • Veröffentlicht 27.01.2020 18:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:27

A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) allows remote attackers to retrieve the configuration, including sensitive data (usernames and passwords). This affects TOTOLINK A3002RU through 2.0.0, ...

Exploit
  • EPSS 0.62%
  • Veröffentlicht 27.01.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 04:35:28

On certain TOTOLINK Realtek SDK based routers, the CAPTCHA text can be retrieved via an {"topicurl":"setting/getSanvas"} POST to the boafrm/formLogin URI, leading to a CAPTCHA bypass. (Also, the CAPTCHA text is not needed once the attacker has determ...