ID

VAR-202312-0768


CVE

CVE-2023-51017


TITLE

TOTOLINK  of  ex1800t  Firmware vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2023-023773

DESCRIPTION

TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the lanIp parameter’ of the setLanConfig interface of the cstecgi .cgi. TOTOLINK of ex1800t There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK EX1800T is a Wi-Fi range extender from China's Zeon Electronics (TOTOLINK) company. There is a command execution vulnerability in the TOTOLINK EX1800T lanIp parameter. This vulnerability stems from the failure of the lanIp parameter of the setLanConfig interface of cstecgi.cgi to correctly filter special characters, commands, etc. in the constructed command. An attacker could exploit this vulnerability to execute arbitrary commands on the system

Trust: 2.16

sources: NVD: CVE-2023-51017 // JVNDB: JVNDB-2023-023773 // CNVD: CNVD-2024-07858

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-07858

AFFECTED PRODUCTS

vendor:totolinkmodel:ex1800tscope:eqversion:9.1.0cu.2112_b20220316

Trust: 1.0

vendor:totolinkmodel:ex1800tscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:ex1800tscope: - version: -

Trust: 0.8

vendor:totolinkmodel:ex1800tscope:eqversion:ex1800t firmware 9.1.0cu.2112 b20220316

Trust: 0.8

vendor:totolinkmodel:ex1800t v9.1.0cu.2112 b20220316scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2024-07858 // JVNDB: JVNDB-2023-023773 // NVD: CVE-2023-51017

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-51017
value: CRITICAL

Trust: 1.0

NVD: CVE-2023-51017
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2024-07858
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-07858
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-51017
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2023-51017
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-07858 // JVNDB: JVNDB-2023-023773 // NVD: CVE-2023-51017

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-023773 // NVD: CVE-2023-51017

EXTERNAL IDS

db:NVDid:CVE-2023-51017

Trust: 3.2

db:JVNDBid:JVNDB-2023-023773

Trust: 0.8

db:CNVDid:CNVD-2024-07858

Trust: 0.6

sources: CNVD: CNVD-2024-07858 // JVNDB: JVNDB-2023-023773 // NVD: CVE-2023-51017

REFERENCES

url:https://815yang.github.io/2023/12/11/ex1800t/totolinkex1800t_v9.1.0cu.2112_b2022031setlanconfig-lanip/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-51017

Trust: 1.4

sources: CNVD: CNVD-2024-07858 // JVNDB: JVNDB-2023-023773 // NVD: CVE-2023-51017

SOURCES

db:CNVDid:CNVD-2024-07858
db:JVNDBid:JVNDB-2023-023773
db:NVDid:CVE-2023-51017

LAST UPDATE DATE

2024-08-14T15:20:47.002000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-07858date:2024-02-05T00:00:00
db:JVNDBid:JVNDB-2023-023773date:2024-01-29T07:35:00
db:NVDid:CVE-2023-51017date:2023-12-27T21:09:57.983

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-07858date:2024-02-06T00:00:00
db:JVNDBid:JVNDB-2023-023773date:2024-01-29T00:00:00
db:NVDid:CVE-2023-51017date:2023-12-22T19:15:09.540