ID

VAR-202312-1594


CVE

CVE-2023-51022


TITLE

TOTOLINK  of  ex1800t  Firmware vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2023-023768

DESCRIPTION

TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘langFlag’ parameter of the setLanguageCfg interface of the cstecgi .cgi. TOTOLINK of ex1800t There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK EX1800T is a Wi-Fi range extender from China's Zeon Electronics (TOTOLINK) company. TOTOLINK EX1800T has a command execution vulnerability. This vulnerability stems from the failure of the langFlag parameter of the setLanguageCfg interface of cstecgi.cgi to correctly filter special characters, commands, etc. in the constructed command. An attacker could exploit this vulnerability to execute arbitrary commands on the system

Trust: 2.16

sources: NVD: CVE-2023-51022 // JVNDB: JVNDB-2023-023768 // CNVD: CNVD-2024-13794

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-13794

AFFECTED PRODUCTS

vendor:totolinkmodel:ex1800tscope:eqversion:9.1.0cu.2112_b20220316

Trust: 1.0

vendor:totolinkmodel:ex1800tscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:ex1800tscope: - version: -

Trust: 0.8

vendor:totolinkmodel:ex1800tscope:eqversion:ex1800t firmware 9.1.0cu.2112 b20220316

Trust: 0.8

vendor:totolinkmodel:ex1800t v9.1.0cu.2112 b20220316scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2024-13794 // JVNDB: JVNDB-2023-023768 // NVD: CVE-2023-51022

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-51022
value: CRITICAL

Trust: 1.0

NVD: CVE-2023-51022
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2024-13794
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-13794
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-51022
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2023-51022
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-13794 // JVNDB: JVNDB-2023-023768 // NVD: CVE-2023-51022

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-023768 // NVD: CVE-2023-51022

EXTERNAL IDS

db:NVDid:CVE-2023-51022

Trust: 3.2

db:JVNDBid:JVNDB-2023-023768

Trust: 0.8

db:CNVDid:CNVD-2024-13794

Trust: 0.6

sources: CNVD: CNVD-2024-13794 // JVNDB: JVNDB-2023-023768 // NVD: CVE-2023-51022

REFERENCES

url:https://815yang.github.io/2023/12/11/ex1800t/2/3/totolinkex1800t_v9.1.0cu.2112_b20220316setlanguagecfg-langflag/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-51022

Trust: 1.4

sources: CNVD: CNVD-2024-13794 // JVNDB: JVNDB-2023-023768 // NVD: CVE-2023-51022

SOURCES

db:CNVDid:CNVD-2024-13794
db:JVNDBid:JVNDB-2023-023768
db:NVDid:CVE-2023-51022

LAST UPDATE DATE

2024-08-14T14:23:42.252000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-13794date:2024-03-18T00:00:00
db:JVNDBid:JVNDB-2023-023768date:2024-01-29T07:35:00
db:NVDid:CVE-2023-51022date:2023-12-27T21:08:45.027

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-13794date:2024-03-18T00:00:00
db:JVNDBid:JVNDB-2023-023768date:2024-01-29T00:00:00
db:NVDid:CVE-2023-51022date:2023-12-22T19:15:09.787