ID

VAR-202305-2974


TITLE

TOTOLINK X5000R has a command execution vulnerability (CNVD-2023-40539)

Trust: 0.6

sources: CNVD: CNVD-2023-40539

DESCRIPTION

TOTOLINK X5000R is a gigabit dual-band WiFi6 router. There is a command execution vulnerability in TOTOLINK X5000R, which can be exploited by attackers to execute arbitrary commands.

Trust: 0.6

sources: CNVD: CNVD-2023-40539

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-40539

AFFECTED PRODUCTS

vendor:totolinkmodel:x5000r v9.1.0u.6118 b20201102scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2023-40539

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2023-40539
value: HIGH

Trust: 0.6

CNVD: CNVD-2023-40539
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:H/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: HIGH
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2023-40539

PATCH

title:Patch for TOTOLINK X5000R has a command execution vulnerability (CNVD-2023-40539)url:https://www.cnvd.org.cn/patchinfo/show/427706

Trust: 0.6

sources: CNVD: CNVD-2023-40539

EXTERNAL IDS

db:CNVDid:CNVD-2023-40539

Trust: 0.6

sources: CNVD: CNVD-2023-40539

SOURCES

db:CNVDid:CNVD-2023-40539

LAST UPDATE DATE

2023-09-28T23:07:51.452000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2023-40539date:2023-05-24T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2023-40539date:2023-05-07T00:00:00