ID

VAR-202312-0941


CVE

CVE-2023-51021


TITLE

TOTOLINK  of  ex1800t  Firmware vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2023-023769

DESCRIPTION

TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘merge’ parameter of the setRptWizardCfg interface of the cstecgi .cgi. TOTOLINK of ex1800t There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK EX1800T is a Wi-Fi range extender from China's TOTOLINK Electronics. The vulnerability is caused by the fact that the merge parameter of the setRptWizardCfg interface of cstecgi.cgi fails to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to execute arbitrary commands on the system

Trust: 2.16

sources: NVD: CVE-2023-51021 // JVNDB: JVNDB-2023-023769 // CNVD: CNVD-2024-21659

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-21659

AFFECTED PRODUCTS

vendor:totolinkmodel:ex1800tscope:eqversion:9.1.0cu.2112_b20220316

Trust: 1.0

vendor:totolinkmodel:ex1800tscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:ex1800tscope: - version: -

Trust: 0.8

vendor:totolinkmodel:ex1800tscope:eqversion:ex1800t firmware 9.1.0cu.2112 b20220316

Trust: 0.8

vendor:totolinkmodel:ex1800t v9.1.0cu.2112 b20220316scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2024-21659 // JVNDB: JVNDB-2023-023769 // NVD: CVE-2023-51021

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-51021
value: CRITICAL

Trust: 1.0

NVD: CVE-2023-51021
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2024-21659
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-21659
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-51021
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2023-51021
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-21659 // JVNDB: JVNDB-2023-023769 // NVD: CVE-2023-51021

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-023769 // NVD: CVE-2023-51021

EXTERNAL IDS

db:NVDid:CVE-2023-51021

Trust: 3.2

db:JVNDBid:JVNDB-2023-023769

Trust: 0.8

db:CNVDid:CNVD-2024-21659

Trust: 0.6

sources: CNVD: CNVD-2024-21659 // JVNDB: JVNDB-2023-023769 // NVD: CVE-2023-51021

REFERENCES

url:https://815yang.github.io/2023/12/11/ex1800t/2/totolinkex1800t_v9.1.0cu.2112_b20220316setrptwizardcfg-merge/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-51021

Trust: 1.4

sources: CNVD: CNVD-2024-21659 // JVNDB: JVNDB-2023-023769 // NVD: CVE-2023-51021

SOURCES

db:CNVDid:CNVD-2024-21659
db:JVNDBid:JVNDB-2023-023769
db:NVDid:CVE-2023-51021

LAST UPDATE DATE

2024-08-14T14:54:24.589000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-21659date:2024-05-08T00:00:00
db:JVNDBid:JVNDB-2023-023769date:2024-01-29T07:35:00
db:NVDid:CVE-2023-51021date:2023-12-27T21:08:51.647

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-21659date:2024-05-10T00:00:00
db:JVNDBid:JVNDB-2023-023769date:2024-01-29T00:00:00
db:NVDid:CVE-2023-51021date:2023-12-22T19:15:09.737