Vulnerability Description
TOTOLINK A3002RU version 2.0.0-B20190902.1958 has a post-authentication RCE due to incorrect access control, allows attackers to bypass front-end security restrictions and execute arbitrary code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | A3002Ru Firmware | 2.0.0-b20190902.1958 |
| Totolink | A3002Ru | - |
Related Weaknesses (CWE)
References
- https://github.com/xieqiang11/security_research/blob/main/TOTOLINK-A3002RU-RCE.mExploitThird Party Advisory
- https://github.com/xieqiang11/security_research/blob/main/TOTOLINK-A3002RU-RCE.mExploitThird Party Advisory
FAQ
What is CVE-2023-48859?
CVE-2023-48859 is a vulnerability with a CVSS score of 8.8 (HIGH). TOTOLINK A3002RU version 2.0.0-B20190902.1958 has a post-authentication RCE due to incorrect access control, allows attackers to bypass front-end security restrictions and execute arbitrary code.
How severe is CVE-2023-48859?
CVE-2023-48859 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-48859?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink A3002Ru Firmware, Totolink A3002Ru.