Totolink

Ex200 Firmware

19 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Published 08.04.2024 13:15:08
  • Last modified 18.03.2025 16:03:30

TOTOLINK EX200 V4.0.3c.7646_B20201211 does not contain an authentication mechanism by default.

  • EPSS 0.08%
  • Published 08.04.2024 13:15:08
  • Last modified 18.03.2025 16:03:37

In TOTOLINK EX200 V4.0.3c.7646_B20201211, an attacker can obtain sensitive information without authorization through the function getWiFiExtenderConfig.

Exploit
  • EPSS 1.48%
  • Published 08.04.2024 13:15:08
  • Last modified 18.03.2025 16:03:42

TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the langType parameter in the setLanguageCfg function.

Exploit
  • EPSS 1.48%
  • Published 08.04.2024 13:15:08
  • Last modified 18.03.2025 16:03:53

TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the FileName parameter in the setUpgradeFW function.

Exploit
  • EPSS 0.84%
  • Published 08.04.2024 13:15:08
  • Last modified 18.03.2025 16:04:05

TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the webWlanIdx parameter in the setWebWlanIdx function.

Exploit
  • EPSS 3.41%
  • Published 08.04.2024 13:15:08
  • Last modified 18.03.2025 16:04:11

TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a remote code execution (RCE) vulnerability via the hostTime parameter in the NTPSyncWithHost function.

  • EPSS 0.04%
  • Published 08.04.2024 13:15:08
  • Last modified 18.03.2025 16:04:16

TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a Denial-of-Service (DoS) vulnerability in the RebootSystem function which can reboot the system without authorization.

Exploit
  • EPSS 0.06%
  • Published 08.04.2024 13:15:08
  • Last modified 18.03.2025 16:04:21

TOTOLINK EX200 V4.0.3c.7646_B20201211 allows attackers to start the Telnet service without authorization via the telnet_enabled parameter in the setTelnetCfg function.

Exploit
  • EPSS 19.99%
  • Published 04.01.2022 14:15:08
  • Last modified 21.11.2024 06:29:39

The downloadFlile.cgi binary file in TOTOLINK EX200 V4.0.3c.7646_B20201211 has a command injection vulnerability when receiving GET parameters. The parameter name can be constructed for unauthenticated command execution.