cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-40041,https://securityvulnerability.io/vulnerability/CVE-2023-40041,,"TOTOLINK T10_v2 5.9c.5061_B20200511 has a stack-based buffer overflow in setWiFiWpsConfig in /lib/cste_modules/wps.so. Attackers can send crafted data in an MQTT packet, via the pin parameter, to control the return address and execute code.",Totolink,T10 V2 Firmware,9.8,CRITICAL,0.001550000044517219,false,false,false,false,,false,false,2023-08-08T00:00:00.000Z,0 CVE-2023-40042,https://securityvulnerability.io/vulnerability/CVE-2023-40042,,"TOTOLINK T10_v2 5.9c.5061_B20200511 has a stack-based buffer overflow in setStaticDhcpConfig in /lib/cste_modules/lan.so. Attackers can send crafted data in an MQTT packet, via the comment parameter, to control the return address and execute code.",Totolink,T10 V2 Firmware,9.8,CRITICAL,0.0013800000306218863,false,false,false,false,,false,false,2023-08-08T00:00:00.000Z,0 CVE-2021-43636,https://securityvulnerability.io/vulnerability/CVE-2021-43636,,Two Buffer Overflow vulnerabilities exists in T10 V2_Firmware V4.1.8cu.5207_B20210320 in the http_request_parse function when processing host data in the HTTP request process.,Totolink,T10 V2 Firmware,9.8,CRITICAL,0.003719999920576811,false,false,false,false,,false,false,2022-03-25T17:55:41.000Z,0 CVE-2022-25081,https://securityvulnerability.io/vulnerability/CVE-2022-25081,,"TOTOLink T10 V5.9c.5061_B20200511 was discovered to contain a command injection vulnerability in the ""Main"" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.",Totolink,T10 V2 Firmware,9.8,CRITICAL,0.0030900000128895044,false,false,false,false,,false,false,2022-02-24T15:15:00.000Z,0