ID

VAR-202309-1949


CVE

CVE-2023-43141


DESCRIPTION

TOTOLINK A3700R V9.1.2u.6134_B20201202 and N600R V5.3c.5137 are vulnerable to Incorrect Access Control.

Trust: 1.0

sources: NVD: CVE-2023-43141

AFFECTED PRODUCTS

vendor:totolinkmodel:n600rscope:eqversion:4.3.0cu.7647_b20210106

Trust: 1.0

vendor:totolinkmodel:a3700rscope:eqversion:9.1.2u.6134_b20201202

Trust: 1.0

sources: NVD: CVE-2023-43141

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-43141
value: CRITICAL

Trust: 1.0

nvd@nist.gov: CVE-2023-43141
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: NVD: CVE-2023-43141

PROBLEMTYPE DATA

problemtype:CWE-284

Trust: 1.0

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2023-43141

EXTERNAL IDS

db:NVDid:CVE-2023-43141

Trust: 1.0

sources: NVD: CVE-2023-43141

REFERENCES

url:http://totolink.com

Trust: 1.0

url:https://github.com/blue-and-white/vul/blob/main/iot/totolink/1/readme.md

Trust: 1.0

sources: NVD: CVE-2023-43141

SOURCES

db:NVDid:CVE-2023-43141

LAST UPDATE DATE

2024-09-25T23:25:13.117000+00:00


SOURCES UPDATE DATE

db:NVDid:CVE-2023-43141date:2024-09-25T01:36:12.940

SOURCES RELEASE DATE

db:NVDid:CVE-2023-43141date:2023-09-25T16:15:14.587