Vulnerability Description
In TOTOLINK A3300R V17.0.0cu.557_B20221024 when dealing with setLedCfg request, there is no verification for the enable parameter, which can lead to command injection.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | A3300R Firmware | 17.0.0cu.557_b20221024 |
| Totolink | A3300R | - |
Related Weaknesses (CWE)
References
- https://github.com/AuroraHaaash/vul_report/blob/main/TOTOLINK%20A3300R-Command%2ExploitThird Party Advisory
- https://github.com/AuroraHaaash/vul_report/blob/main/TOTOLINK%20A3300R-Command%2ExploitThird Party Advisory
FAQ
What is CVE-2023-46993?
CVE-2023-46993 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In TOTOLINK A3300R V17.0.0cu.557_B20221024 when dealing with setLedCfg request, there is no verification for the enable parameter, which can lead to command injection.
How severe is CVE-2023-46993?
CVE-2023-46993 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-46993?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink A3300R Firmware, Totolink A3300R.