ID

VAR-202206-2411


TITLE

Command execution vulnerability exists in TOTOLINK N600R

Trust: 0.6

sources: CNVD: CNVD-2022-41351

DESCRIPTION

TOTOLINK N600R is a wireless router. TOTOLINK N600R has a command execution vulnerability, which can be exploited by attackers to gain server privileges.

Trust: 0.6

sources: CNVD: CNVD-2022-41351

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2022-41351

AFFECTED PRODUCTS

vendor:zeonmodel:totolink n600r v5.3c.2043scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2022-41351

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2022-41351
value: HIGH

Trust: 0.6

CNVD: CNVD-2022-41351
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2022-41351

PATCH

title:Patch for Command execution vulnerability exists in TOTOLINK N600Rurl:https://www.cnvd.org.cn/patchinfo/show/334016

Trust: 0.6

sources: CNVD: CNVD-2022-41351

EXTERNAL IDS

db:CNVDid:CNVD-2022-41351

Trust: 0.6

sources: CNVD: CNVD-2022-41351

SOURCES

db:CNVDid:CNVD-2022-41351

LAST UPDATE DATE

2023-09-28T23:03:02.554000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2022-41351date:2022-05-27T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2022-41351date:2022-06-03T00:00:00