Note:
This project will be discontinued after December 13, 2021. [more]
Product:
A860r_firmware
(Totolink)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 8 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-09-29 | CVE-2022-40475 | TOTOLINK A860R V4.1.2cu.5182_B20201027 was discovered to contain a command injection via the component /cgi-bin/downloadFile.cgi. | A860r_firmware | 9.8 | ||
2022-02-24 | CVE-2022-25083 | TOTOLink A860R V4.1.2cu.5182_B20201027 was discovered to contain a command injection vulnerability in the "Main" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter. | A860r_firmware | 9.8 | ||
2022-08-29 | CVE-2022-36614 | TOTOLINK A860R V4.1.2cu.5182_B20201027 was discovered to contain a hardcoded password for root at /etc/shadow.sample. | A860r_firmware | 7.8 | ||
2022-09-06 | CVE-2022-37839 | TOTOLINK A860R V4.1.2cu.5182_B20201027 is vulnerable to Buffer Overflow via Cstecgi.cgi. | A860r_firmware | 9.8 | ||
2022-09-06 | CVE-2022-37840 | In TOTOLINK A860R V4.1.2cu.5182_B20201027, the main function in downloadfile.cgi has a buffer overflow vulnerability. | A860r_firmware | 9.8 | ||
2022-09-06 | CVE-2022-37841 | In TOTOLINK A860R V4.1.2cu.5182_B20201027 there is a hard coded password for root in /etc/shadow.sample. | A860r_firmware | 7.5 | ||
2022-09-06 | CVE-2022-37842 | In TOTOLINK A860R V4.1.2cu.5182_B20201027, the parameters in infostat.cgi are not filtered, causing a buffer overflow vulnerability. | A860r_firmware | 9.8 | ||
2022-09-06 | CVE-2022-37843 | In TOTOLINK A860R V4.1.2cu.5182_B20201027 in cstecgi.cgi, the acquired parameters are directly put into the system for execution without filtering, resulting in a command injection vulnerability. | A860r_firmware | 9.8 |