ID

VAR-202305-1882


CVE

CVE-2023-31729


TITLE

TOTOLINK A3300R Command Injection Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2023-41866 // CNNVD: CNNVD-202305-1754

DESCRIPTION

TOTOLINK A3300R v17.0.0cu.557 is vulnerable to Command Injection via /cgi-bin/cstecgi.cgi. TOTOLINK A3300R is a wireless router produced by TOTOLINK in China. The vulnerability comes from the fact that the setddnscfg function of requesting /cgi-bin/cstecgi.cgi fails to properly filter special characters, commands, etc. in constructing commands. An attacker could exploit this vulnerability to cause arbitrary command execution

Trust: 1.53

sources: NVD: CVE-2023-31729 // CNVD: CNVD-2023-41866 // VULMON: CVE-2023-31729

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-41866

AFFECTED PRODUCTS

vendor:totolinkmodel:a3300rscope:eqversion:17.0.0cu.557

Trust: 1.0

vendor:totolinkmodel:a3300r v17.0.0cu.557scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2023-41866 // NVD: CVE-2023-31729

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-31729
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-31729
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2023-41866
value: HIGH

Trust: 0.6

CNNVD: CNNVD-202305-1754
value: CRITICAL

Trust: 0.6

CNVD: CNVD-2023-41866
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-31729
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

sources: CNVD: CNVD-2023-41866 // CNNVD: CNNVD-202305-1754 // NVD: CVE-2023-31729 // NVD: CVE-2023-31729

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

sources: NVD: CVE-2023-31729

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202305-1754

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202305-1754

EXTERNAL IDS

db:NVDid:CVE-2023-31729

Trust: 2.3

db:CNVDid:CNVD-2023-41866

Trust: 0.6

db:CNNVDid:CNNVD-202305-1754

Trust: 0.6

db:VULMONid:CVE-2023-31729

Trust: 0.1

sources: CNVD: CNVD-2023-41866 // VULMON: CVE-2023-31729 // CNNVD: CNNVD-202305-1754 // NVD: CVE-2023-31729

REFERENCES

url:https://github.com/d2y6p/cve/blob/main/totolink/cve-2023-31729/cve-2023-31729.md

Trust: 2.3

url:http://totolink.com

Trust: 1.7

url:https://github.com/d2y6p/cve/blob/2bac2c96e24229fa99e0254eaac1b8809e424b4b/totolink/cve-2023-31729/cve-2023-31729.md

Trust: 1.0

url:https://cxsecurity.com/cveshow/cve-2023-31729/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2023-41866 // VULMON: CVE-2023-31729 // CNNVD: CNNVD-202305-1754 // NVD: CVE-2023-31729

SOURCES

db:CNVDid:CNVD-2023-41866
db:VULMONid:CVE-2023-31729
db:CNNVDid:CNNVD-202305-1754
db:NVDid:CVE-2023-31729

LAST UPDATE DATE

2025-01-24T22:58:17.300000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2023-41866date:2023-05-26T00:00:00
db:VULMONid:CVE-2023-31729date:2023-05-18T00:00:00
db:CNNVDid:CNNVD-202305-1754date:2023-05-26T00:00:00
db:NVDid:CVE-2023-31729date:2025-01-22T15:15:09.043

SOURCES RELEASE DATE

db:CNVDid:CNVD-2023-41866date:2023-05-26T00:00:00
db:VULMONid:CVE-2023-31729date:2023-05-18T00:00:00
db:CNNVDid:CNNVD-202305-1754date:2023-05-18T00:00:00
db:NVDid:CVE-2023-31729date:2023-05-18T02:15:12.380