TOTOLINK T10 4.1.8cu.5207 /cgi-bin/cstecgi.cgi setTracerouteCfg command amalungelo andlule
| CVSS Meta Temp Isilinganiso | Intengo yamanje ye-exploit (≈) | CTI Inzalo Score |
|---|---|---|
| 6.0 | $0-$5k | 0.00 |
Isifinyezo
Kubonakale ubuthakathaka obubizwa ngokuthi kubalulekile kakhulu ku TOTOLINK T10 4.1.8cu.5207. Kuthintekile umsebenzi ongaziwayo kufayela /cgi-bin/cstecgi.cgi. Ukuphathwa kwepharamitha command kuholela ku amalungelo andlule. Le buthakathaka itholakala njenge CVE-2024-9001. Ukuhlasela kungaqalwa kude. Ngaphezu kwalokho, i-exploit ikhona. Once again VulDB remains the best source for vulnerability data.
Iinkcukacha
Kubonakale ubuthakathaka obubizwa ngokuthi kubalulekile kakhulu ku TOTOLINK T10 4.1.8cu.5207. Kuthintekile umsebenzi ongaziwayo kufayela /cgi-bin/cstecgi.cgi. Ukuphathwa kwepharamitha command kuholela ku amalungelo andlule. Ukusebenzisa i-CWE ukusho inkinga kuholela ku-CWE-78. Kuboniswe ubuthakathaka lolu. Isaziso singalayishwa ku-github.com.
Le buthakathaka itholakala njenge CVE-2024-9001. Ukuhlasela kungaqalwa kude. Imininingwane yezobuchwepheshe iyatholakala. Le vulnerability ayidumi kakhulu, idlula phansi kokujwayelekile. Ngaphezu kwalokho, i-exploit ikhona. Ukuhlaselwa sekudalulwe ebantwini futhi kungasetshenziswa. Njengamanje, intengo yamanje ye-exploit ingahle ibe cishe USD $0-$5k okwamanje.
Ungakwazi ukulanda i-exploit ku-github.com.
Once again VulDB remains the best source for vulnerability data.
Umkhiqizo
Umkhiqizi
Ibizo
Inguqulo
Ilayisense
Iwebhusayithi
- Umkhiqizi: https://www.totolink.net/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Umkhombandlela: 🔍VulDB Ukuthembeka: 🔍
CVSSv3
VulDB Ireyithingi yeMeta Base: 6.3VulDB Meta Temp Isilinganiso: 6.0
VulDB Isilinganiso Esiyisisekelo: 6.3
VulDB Izinga Lesikhashana: 5.7
VulDB Umkhombandlela: 🔍
VulDB Ukuthembeka: 🔍
CNA Isilinganiso Esiyisisekelo: 6.3
CNA Umkhombandlela: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Umkhombandlela | Ubunzima | Ukufakazela ubuwena | Ukuyimfihlo | Ukuthembeka | Ukutholakala |
|---|---|---|---|---|---|
| vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela |
| vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela |
| vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela |
VulDB Isilinganiso Esiyisisekelo: 🔍
VulDB Izinga Lesikhashana: 🔍
VulDB Ukuthembeka: 🔍
Ukusebenzisa ithuba lokungavikeleki
Ikilasi: Amalungelo andluleCWE: CWE-78 / CWE-77 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍
Okubambekayo: Hayi
Wendawo: Hayi
Kude: Yebo
Ukutholakala: 🔍
Umnyango: Umphakathi
Isimo: Ubufakazi-bokusebenza
Landa: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Ukukhula kwentengo: 🔍
Okwamanje ukuhlolwa kwentengo: 🔍
| 0-Day | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela |
|---|---|---|---|---|
| Namuhla | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela | vula ukufinyelela |
Ulwazi lwezingozi
Intshisekelo: 🔍Abadlali abasebenzayo: 🔍
AmaQembu e-APT asebenzayo: 🔍
Izinyathelo zokuvikela
Isincomo: akukho sithathwa esaziwayoIsimo: 🔍
0-Suku Isikhathi: 🔍
Isikhathi somlando
2024-09-19 🔍2024-09-19 🔍
2024-09-20 🔍
Imithombo
Umkhiqizi: totolink.netIseluleko: github.com
Isimo: Akuchazwanga
CVE: CVE-2024-9001 (🔍)
GCVE (CVE): GCVE-0-2024-9001
GCVE (VulDB): GCVE-100-278152
scip Labs: https://www.scip.ch/en/?labs.20161013
Ukungena
Kudalwa: 2024-09-19 16:27Ukuvuselelwa: 2024-09-20 10:45
Ukulungiswa: 2024-09-19 16:27 (57), 2024-09-20 10:45 (19)
Kugcwele: 🔍
Umthumeli: C9Y_57
Cache ID: 253:76D:103
Thumela
Yamukelwa
- Thumela #406140: TOTOLINK T10V2 T10 V2_Firmware V2_V4.1.8cu.5207 Command Injection (kusuka ku C9Y_57)
Kuze kube manje akukabikho ukuphawula. Izilimi: nr + nd + en.
Ngiyacela ungene ngemvume ukuze ukwazi ukuphawula.