ID

VAR-202205-2160


TITLE

Command Execution Vulnerability in TOTOLINK A3100R

Trust: 0.6

sources: CNVD: CNVD-2022-33586

DESCRIPTION

TOTOLINK A3100R is a wireless router. TOTOLINK A3100R has a command execution vulnerability, which can be exploited by attackers to gain control of the server.

Trust: 0.6

sources: CNVD: CNVD-2022-33586

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-33586

AFFECTED PRODUCTS

vendor:totolinkmodel:a3100r v4.1.2cu.5050scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2022-33586

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2022-33586
value: HIGH

Trust: 0.6

CNVD: CNVD-2022-33586
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2022-33586

PATCH

title:Patch for Command Execution Vulnerability in TOTOLINK A3100Rurl:https://www.cnvd.org.cn/patchinfo/show/330051

Trust: 0.6

sources: CNVD: CNVD-2022-33586

EXTERNAL IDS

db:CNVDid:CNVD-2022-33586

Trust: 0.6

sources: CNVD: CNVD-2022-33586

SOURCES

db:CNVDid:CNVD-2022-33586

LAST UPDATE DATE

2023-09-29T23:18:13.993000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-33586date:2022-04-29T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-33586date:2022-05-21T00:00:00