cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-52026,https://securityvulnerability.io/vulnerability/CVE-2023-52026,Remote Command Execution Vulnerability in TOTOlink EX1800T by TOTOlink,"The TOTOlink EX1800T model V9.1.0cu.2112_B20220316 is susceptible to a remote command execution vulnerability caused by improper handling of the telnet_enabled parameter located within the setTelnetCfg interface. This vulnerability could potentially allow an attacker to execute arbitrary commands on the affected device remotely, compromising the security and functionality of the network device. Addressing this issue is crucial for users of the TOTOlink EX1800T to maintain the integrity and security of their systems.",Totolink,Ex1800t Firmware,9.8,CRITICAL,0.0030499999411404133,false,false,false,false,,false,false,2024-01-12T00:00:00.000Z,0 CVE-2023-51014,https://securityvulnerability.io/vulnerability/CVE-2023-51014,Arbitrary Command Execution Vulnerability in TOTOLINK EX1800T Router,"The TOTOLINK EX1800T version V9.1.0cu.2112_B20220316 has a vulnerability that allows unauthorized users to execute arbitrary commands via the 'lanSecDns' parameter in the setLanConfig interface of the cstecgi .cgi script. This flaw can potentially compromise the integrity and security of the router, enabling attackers to manipulate configurations and execute malicious commands remotely.",Totolink,Ex1800t Firmware,9.8,CRITICAL,0.026729999110102654,false,false,false,false,,false,false,2023-12-22T00:00:00.000Z,0 CVE-2023-51015,https://securityvulnerability.io/vulnerability/CVE-2023-51015,Arbitrary Command Execution Vulnerability in TOTOLINK EX1800T Router,"The TOTOLINK EX1800T router, specifically version 9.1.0cu.2112_B20220316, is susceptible to an arbitrary command execution vulnerability. This flaw exists within the 'enable parameter' of the setDmzCfg interface, where improper validation allows attackers to execute arbitrary commands on the system, potentially compromising the device and the network it connects to.",Totolink,Ex1800t Firmware,9.8,CRITICAL,0.020659999921917915,false,false,false,false,,false,false,2023-12-22T00:00:00.000Z,0 CVE-2023-51025,https://securityvulnerability.io/vulnerability/CVE-2023-51025,Unauthorized Command Execution Vulnerability in TOTOlink EX1800T by TOTOlink,"The TOTOlink EX1800T (version V9.1.0cu.2112_B20220316) is susceptible to an unauthorized command execution vulnerability affecting the 'admuser' parameter within the setPasswordCfg interface of the cstecgi .cgi script. This weakness may allow attackers to execute arbitrary commands, posing significant risks to device security and network integrity. It is crucial for users of this product to apply updates promptly and follow best practices for device security.",Totolink,Ex1800t Firmware,9.8,CRITICAL,0.026729999110102654,false,false,false,false,,false,false,2023-12-22T00:00:00.000Z,0 CVE-2023-51026,https://securityvulnerability.io/vulnerability/CVE-2023-51026,,TOTOlink EX1800T V9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘hour’ parameter of the setRebootScheCfg interface of the cstecgi .cgi.,Totolink,Ex1800t Firmware,9.8,CRITICAL,0.020659999921917915,false,false,false,false,,false,false,2023-12-22T00:00:00.000Z,0